Threats and Vulnerabilities Flashcards

SECTION 3

1
Q

Anything that could cause harm, loss, damage, or compromise to our information
technology systems

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

● Natural disasters
● Cyber-attacks
● Data integrity breaches
● Disclosure of confidential information

A

Threat that can come from the following

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any weakness in the system design or implementation

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

● Software bugs
● Misconfigured software
● Improperly protected network devices
● Missing security patches
● Lack of physical security

A

Vulnerability that can come from internal factors like the following

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where threats and vulnerabilities intersect

A

Where the risk to your enterprise
systems and networks lies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If you have a threat, but there is no matching vulnerability to it, then you have no
risk

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The same holds true that if you have a vulnerability but there’s no threat against
it, there would be no risk

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Finding different ways to minimize the likelihood of an outcome and achieve the
desired outcome

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly