Week 1 Flashcards

1
Q

Risk assessment steps

A

Risk assessment: determine likelihood and impact

  • Risk mitigation: avoid, reduce, transfer, accept
  • Communication and consultation
  • Monitoring and review
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information security concerns

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA: Confidentiality

A

Preserving authorised restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA: Integrity

A

Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIA: Availability

A

Ensuring timely and reliable access to and use of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CIA: Auditability

A

Ensuring that evidence of all crucial transactions is stored reliably for auditing purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk assessment Refsdal

A
Step 1: Context establishment
Step 2: Risk identification
Step 3: Risk analysis
Step 4: Evaluation
Step 5: Risk treatment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information Security as a process: Being in control

A

Plan Do Check Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security controls

A
  • Organisational: functional, role, task (SoD)
  • Procedural: verification, workflow
  • Technical: basic security (separate networks, firewalls, routers, encryption techniques), access control, logging and monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access control

A
  • Identification: unique way of identifying an entity (e.g. login)
  • Authentication: proof of identity (e.g. password)
  • Authorization: rights (read, write, execute) of person in role
  • Nonrepudiation: receiver can’t deny receipt of message
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access control

A
  • Identification: unique way of identifying an entity (e.g. login)
  • Authentication: proof of identity (e.g. password)
  • Authorization: rights (read, write, execute) of person in role
  • Nonrepudiation: receiver can’t deny receipt of message
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Resilience

A

Ability of assets, networks and systems to anticipate, absorb, adapt to (i.e. respond) and/or recover from a disruptive event or circumstance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Systematic risk

A

is the risk of having not just statistically independent failures, but interdependent, so-called ‘cascading’ failures in a network of N interconnected system components (Helbing 2013; p 51)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hellbing writes

A

To cope with hyper-risks, it is necessary to develop risk competence and to prepare and exercise contingency plans for all sorts of possible failure cascades. […]. The aim is to attain a resilient (‘forgiving’) system design and operation. (Helbing p 55)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly