Podcast
Questions and Answers
What is the primary purpose of creating a risk heat map?
What is the primary purpose of creating a risk heat map?
- To share risks with third parties
- To avoid all types of risks
- To provide a visual representation of the nature and impact of risks (correct)
- To document security posture
Risk acceptance involves eliminating a potential risk completely.
Risk acceptance involves eliminating a potential risk completely.
False (B)
What is the first major process in risk management?
What is the first major process in risk management?
Risk identification
Risk _____ involves contracting with a third party to bear some or all costs of a risk.
Risk _____ involves contracting with a third party to bear some or all costs of a risk.
Match the following processes in risk management with their descriptions:
Match the following processes in risk management with their descriptions:
What does risk mitigation typically involve?
What does risk mitigation typically involve?
Monitoring and review in risk management helps determine if the controls are effective.
Monitoring and review in risk management helps determine if the controls are effective.
What is the main aim of risk evaluation?
What is the main aim of risk evaluation?
Which of the following best describes the objective of information security?
Which of the following best describes the objective of information security?
One of the main functions of counterintelligence is to support an opposition's intelligence program.
One of the main functions of counterintelligence is to support an opposition's intelligence program.
What is the purpose of risk mitigation strategies?
What is the purpose of risk mitigation strategies?
The process of __________ involves acknowledging risks and their effects.
The process of __________ involves acknowledging risks and their effects.
Match the risk response strategies with their definitions:
Match the risk response strategies with their definitions:
Which step in ISO 31000's seven-step process involves defining risk scenarios?
Which step in ISO 31000's seven-step process involves defining risk scenarios?
Quantitative risk analysis focuses solely on qualitative descriptions of potential risks.
Quantitative risk analysis focuses solely on qualitative descriptions of potential risks.
Provide one example of a simulation used in risk analysis.
Provide one example of a simulation used in risk analysis.
Which of the following is NOT one of the four basic types of threat categories?
Which of the following is NOT one of the four basic types of threat categories?
Risk management plans only outline the financial aspects of managing risk.
Risk management plans only outline the financial aspects of managing risk.
Name two characteristics of risk categories.
Name two characteristics of risk categories.
The attribute that assures a sender of data is provided with proof of delivery is called _______.
The attribute that assures a sender of data is provided with proof of delivery is called _______.
Match the risk categories with their descriptions:
Match the risk categories with their descriptions:
Which aspect of information assurance ensures that authorized users have proper access?
Which aspect of information assurance ensures that authorized users have proper access?
Confidentiality refers to ensuring that information is available to all personnel.
Confidentiality refers to ensuring that information is available to all personnel.
What role does authentication play in information security?
What role does authentication play in information security?
Flashcards
Risk Identification
Risk Identification
The process of finding and recording security issues and risks in an organization's IT systems.
Risk Assessment
Risk Assessment
Evaluating how likely and damaging potential risks are to the organization.
Risk Control
Risk Control
Implementing actions to reduce risks to data and IT systems.
Risk Avoidance
Risk Avoidance
Signup and view all the flashcards
Risk Mitigation
Risk Mitigation
Signup and view all the flashcards
Risk Sharing/Transfer
Risk Sharing/Transfer
Signup and view all the flashcards
Risk Acceptance
Risk Acceptance
Signup and view all the flashcards
Risk Evaluation
Risk Evaluation
Signup and view all the flashcards
Risk Treatment
Risk Treatment
Signup and view all the flashcards
Monitoring and Review
Monitoring and Review
Signup and view all the flashcards
Cybersecurity
Cybersecurity
Signup and view all the flashcards
Information Security
Information Security
Signup and view all the flashcards
Counterintelligence
Counterintelligence
Signup and view all the flashcards
Risk Analysis
Risk Analysis
Signup and view all the flashcards
Risk Matrix
Risk Matrix
Signup and view all the flashcards
Risk Simulations
Risk Simulations
Signup and view all the flashcards
Decision Trees
Decision Trees
Signup and view all the flashcards
Risk Responses (Eliminate)
Risk Responses (Eliminate)
Signup and view all the flashcards
Risk Responses (Transfer)
Risk Responses (Transfer)
Signup and view all the flashcards
Risk Responses (Mitigate)
Risk Responses (Mitigate)
Signup and view all the flashcards
Risk Responses (Accept)
Risk Responses (Accept)
Signup and view all the flashcards
Risk Monitoring & Control
Risk Monitoring & Control
Signup and view all the flashcards
Risk Learning & Improvement
Risk Learning & Improvement
Signup and view all the flashcards
ISO 31000
ISO 31000
Signup and view all the flashcards
ERM Framework
ERM Framework
Signup and view all the flashcards
Risk Identification
Risk Identification
Signup and view all the flashcards
Insider Threat
Insider Threat
Signup and view all the flashcards
External Threat
External Threat
Signup and view all the flashcards
Man-made Threat
Man-made Threat
Signup and view all the flashcards
Natural Disaster Threat
Natural Disaster Threat
Signup and view all the flashcards
Risk Management Plan
Risk Management Plan
Signup and view all the flashcards
Information Exposure/Loss
Information Exposure/Loss
Signup and view all the flashcards
Unauthorized Use
Unauthorized Use
Signup and view all the flashcards
Availability (Security)
Availability (Security)
Signup and view all the flashcards
Integrity (Security)
Integrity (Security)
Signup and view all the flashcards
Authentication (Security)
Authentication (Security)
Signup and view all the flashcards
Confidentiality (Security)
Confidentiality (Security)
Signup and view all the flashcards
Non-repudiation (Security)
Non-repudiation (Security)
Signup and view all the flashcards
Risk Assessment Methodologies
Risk Assessment Methodologies
Signup and view all the flashcards
Weak Processes
Weak Processes
Signup and view all the flashcards
Exposure to Legal Action
Exposure to Legal Action
Signup and view all the flashcards
Exposure to Contaminated Environments
Exposure to Contaminated Environments
Signup and view all the flashcards
Loss of public confidence
Loss of public confidence
Signup and view all the flashcards
Study Notes
Module 1
- Information security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording, or destruction of sensitive records.
- Cyber security applies technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber-attacks.
- Costs of cyber security breaches are increasing.
- Cyber-attacks are becoming more sophisticated.
- Cyber security is a critical business issue.
- Cybercrime is a large business.
- Common cyber threats include malware (ransomware, botnet software, trojan), backdoors, form jacking, cryptojacking, DDoS (Distributed Denial-of-Service) attacks, and DNS (Domain Name System) Poisoning attacks.
- Types of cyber security include network security, cloud security, IoT security, and application security.
Module 2
- Risk management is a continuing process to identify, analyze, evaluate, and treat loss exposure, and monitor risk control to mitigate losses.
- Steps to manage SDLC risk:
- Define risk management plan (risk identification, analysis, implementation, monitoring, and improvement)
- Identify and document risks (brainstorming, interviews, surveys, checklists, historical data, expert opinions)
- Analyze and prioritize risks (risk matrices, simulations, decision trees)
- Plan and implement risk responses (avoid, transfer, mitigate, accept)
- Monitor and control risks
- Learn and improve from risks
- A risk register helps track identified risks in software.
Module 3
- Risk management plan details an organization's risk approach, roles of risk management teams, resources for the process, and internal policies/procedures.
- Three Major Processes in Risk Management:
- Risk identification
- Risk assessment
- Risk control
- Four basic threat categories: insider threats, external threats, man-made threats, and natural disasters.
Module 4
- Risk assessment methodologies include both qualitative and quantitative methods.
- Qualitative: Descriptions, quicker, less rigorous, subjective results.
- Quantitative: Numbers, measurable, more rigorous, objective results.
- SLE (Single Loss Expectancy) calculation: Asset Value (AV) * Exposure Factor (EF)
- ALE (Annual Loss Expectancy) calculation: SLE * Average Rate of Occurrence (ARO)
- Information Assurance (IA) protects data integrity, availability, authenticity, non-repudiation, and confidentiality
- Information security protects against unauthorized access, use, disclosure, disruption, modification or destruction of data.
- Differences between IA and IS: IA is concerned with overall organizational risk and standards, while IS focuses on methods to reduce risks.
Module 5
- Information assurance is the practice of assuring and managing risks related to confidential information throughout the process of transmission, processing, and storing data.
- Key characteristics of information assurance include availability, integrity, authentication, confidentiality and non-repudiation of data.
- Information assurance is more focused on organizational risk management and data quality while information security focuses on technical solutions to reduce risks.
Module 6
- Security controls are countermeasures to reduce threats exploiting vulnerabilities.
- Risk mitigation is reducing the likelihood that a threat will exploit a vulnerability, resulting in loss.
- Threats are events that compromise confidentiality, integrity, and availability.
- Vulnerabilities are weaknesses or flaws in hardware, software, or organizational processes.
- Security incidents are occurrences that jeopardize CIA of information systems or violate security policies.
- Types of security controls:
- Physical: Walls, locks, surveillance.
- Administrative: Policies/procedures.
- Technical: Software, firewalls, encryption, access control.
- Configuration rules, administrative controls, and physical security controls to prevent unauthorized access.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.