SY0-701: 5.0 (Security Program Management and Oversight) Flashcards
Social Engineering Motivational Triggers (5.6)
Authority
Urgency
Social Proof
Scarcity
Likability
Fear
Soc Eng Trigger- Authority (5.6)
The power or right to give orders, make decisions, and enforce obedience
Soc Eng Trigger- Urgency (5.6)
Compelling sense of immediacy or time-sensitivity that drivers individuals to act swiftly or prioritize certain actions
Soc Eng Trigger- Social Proof (5.6)
Psychological phenomenon where individuals look to the behaviors and actions of others to determine their own decisions or actions in similar situations
Soc Eng Trigger- Scarcity (5.6)
Psychological pressure people feel when they believe a product, opportunity, or resource is in limited or in short supply
Soc Eng Trigger- Likability (5.6)
Associated with being nice, friendly, and socially accepted by others
Soc Eng Trigger- Fear (5.6)
Feeling afraid of someone or something, as likely to be dangerous, painful, or threatening
Data Ownership (5.1)
Process of identifying the person responsible for the confidentiality, integrity, availability, and privacy of the information assets
Data Owner (5.1)
Senior executive role who has the responsibility for maintaining the confidentiality, integrity, and availability of the information asset
Data Controller (5.1)
Entity that holds responsibility for deciding the purposes and methods of data storage, collection, and usage and for guaranteeing the legality of processes
Data Processor (5.1)
Group or individual hired by the Data Controller to help with tasks like collecting, storing, or analyzing data
Data Steward (5.1)
Focused on the quality of the data and the associated metadata
Data Custodian (5.1)
Responsible for handling the management of the system on which the data assets are stored (e.g. SysAdmin)
Privacy Officer (5.1)
Role that is responsible for the oversight of any kind of privacy-related data, like PII (Personally Identifying Information), SPI (Sensitive Personal Information), PHI (Personal Health Information)
Risk Management (5.2)
Fundamental process that involves identifying, analyzing, monitoring, and reporting risks
Risk Management Lifecycle (5.2)
- Risk identification
- Risk analysis
- Risk treatment
- Risk monitoring
- Risk reporting
Risk Assessment Frequency (5.2)
Refers to how often the risk assessment process is conducted within an organization
Risk Assessment Frequency Types (5.2)
Ad-hoc
Recurring
One-Time
Continuous
Ad-hoc (5.2)
Conducted as and when needed, often in response to a specific event or situation that has the potential to introduce new risks or change the nature of existing risks; associated with specific events or situations
Recurring (5.2)
Conducted at regular intervals, such as annually, quarterly, or monthly
One-Time (5.2)
Conducted for a specific purpose and are not repeated; associated with a specific project or initiative
Continuous (5.2)
Ongoing monitoring and evaluation of risks
Risk Identification (5.2)
Recognizing potential risks that could negatively impact an organizations ability to operate or achieve its objective
RTO (5.2)
Recovery Time Objective- Represents the maximum acceptable length of time that can elapse before the lack of a business function severely impacts the organization
RPO (5.2)
Recovery Point Objective- Represents the maximum acceptable amount of data loss measured in time (if business has RPO of 4 hours then it can handle 4 hours of down time)
MTTR (5.2)
Mean Time To Repair- Represents the average time required to repair a failed component or system
MTBF (5.2)
Mean Time Between Failure- Represents the average time between failures
BIA (5.2)
Business Impact Analysis- Process that involves evaluating the potential effects of disruption to an organizations business functions and processes
Risk Register (Risk Log) (5.2)
A document detailing identified risks, including their description, impact likelihood, and mitigation strategies; contains:
Risk description
Risk impact
Risk likelihood
Risk outcome
Risk level
Cost
Risk description (5.2)
Entails identifying and providing a detailed description
Risk impact (5.2)
Potential consequences if the risk materializes
Risk likelihood (5.2)
Chance of a particular risk occurring
Risk outcome (5.2)
Result of a risk, linked to its impact and likelihood
Risk level / Threshold (5.2)
Determined by combining the impact and likelihood
Cost (5.2)
Pertains to its financial impact on the project, including potential expenses if it occurs or the cost of risk mitigation
Risk Tolerance / Risk Acceptance (5.2)
Refers to an organizations or individuals willingness to deal with uncertainty in pursuit of their goals
Risk Appetite (5.2)
Signifies an organizations willingness to embrace or retain specific types and levels of risk to fulfill its strategic goals
Expansionary Risk Appetite (5.2)
Organization is open to taking more risk in the hopes of achieving greater returns
Conservative Risk Appetite (5.2)
Implies that an organization favors less risk, even if it leads to lower returns
Neutral Risk Appetite (5.2)
Signifies a balance between risk and return
KRIs (5.2)
Key Risk Indicators- Essential predictive metrics used by organizations to signal rising risk levels in different parts of the enterprise
Risk Owner (5.2)
Person or group responsible for managing the risk
Qualitative Risk Analysis (5.2)
A method of assessing risks based on their potential impact and the likelihood of their occurrence (usually described as Low, Medium, High); Subjective and high level
Quantitative Risk Analysis (5.2)
A method of evaluating risk that uses numerical measurements (usually described as a number); Objective and numerical evaluation of risks
EF (5.2)
Exposure Factor- Proportion of an asset that is lost in an event (expressed as a percentage)
SLE (5.2)
Single Loss Expectancy- Monetary value expected to be lost in a single event (expressed as a monetary amount)
ARO (5.2)
Annualized Rate of Occurrence- Estimated frequency with which a threat is expected to occur within a year
ALE (5.2)
Annualized Loss Expectancy- Expected annual loss from a risk (SLE x ARO)
Risk Management Types (5.2)
Transfer
Accept
Avoid
Mitigate
Risk Transference (Risk Sharing) (5.2)
Involves shifting the risk from the organization to another party (most common type is insurance)
Contract Indemnity Clause (5.2)
A contractual agreement where one party agrees to cover the others harm, liability, or loss stemming from the contract (form of risk transference)
Risk Acceptance (5.2)
Recognizing a risk and choosing to address it when it arises
Exemption (5.2)
Provision that grants an exception from a specific rule or requirement
Exception (5.2)
Provision that permits a party to bypass a rule or requirement in certain situations
Risk Avoidance (5.2)
Strategy of altering plans or approaches to completely eliminate a specific risk
Risk Mitigation (5.2)
Implementing measures to decrease the likelihood or impact of a risk
Risk Monitoring (5.2)
Involves continuously tracking identified risks, assessing new risks, executing response plans, and evaluating their effectiveness during a projects lifecycle
Residual Risk (5.2)
Likelihood and impact after implementing mitigation, transference, or acceptance
Risk Reporting (5.2)
Process of communicating information about risk management activities
Third Party Vendor Risk (5.3)
Potential security and operational challenges introduced by external entities (vendors, suppliers, or service providers)