Security & Risk Management Flashcards
The Officer who is Accountable for ensuring the protection of all of the business information assets from intentional & unintentional loss, disclosure, alteration, destruction, & unavailability
Information Security Officer
Controls designed to discourage people from violating security directives.
Deterrent Controls
Controls designed to signal a warning when a security control has been breached.
Detective Controls
Electronic hardware & software solutions implemented to control access to information & information networks
Logical Controls
The practice of coming up with alternatives so that the risk in question is not realized.
Risk Avoidance
The practice of accepting certain risk typically based on a business decision that may also weigh the cost versus the benefit of dealing with the risk in another way
Risk Acceptance
- Combination of the probability of an event & its consequences.
- An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result. (RFC 2828)
Risk
Controls implemented to prevent a security incident or information breach
Preventative Controls
Controls to protect the organization’s people & physical environment, such as locks, fire management, gates, & guards; physical controls may be called “operational controls” in some contexts
Physical Controls
Comes in 2 forms; making sure information is processed correctly & not modified by unauthorized persons, & protecting information as it transits
Integrity
Procedures implemented to define the roles, responsibilities, policies, & administrative functions needed to manage the control environment
Administrative Controls
The principle that ensures that information is available & accessible to users when needed
Availability
An incident that results in the disclosure or potential exposure of data
Breach
The practice of the elimination of or the significant decrease in the level of risk presented
Risk Mitigation
Determines the potential impact of disruptive events on the organization’s business processes
Vulnerability Assessment