Podcast
Questions and Answers
Which type of threat involves unauthorized changes to a website?
Which type of threat involves unauthorized changes to a website?
- Loss of confidentiality
- Loss of integrity (correct)
- Loss of availability
- Accidental threat
Internal threats are always uncontrolled and cannot be managed by the organization.
Internal threats are always uncontrolled and cannot be managed by the organization.
False (B)
What are the two main categories of threats based on their origin?
What are the two main categories of threats based on their origin?
External and internal
A threat caused by extreme weather events such as hurricanes is classified as a __________ threat.
A threat caused by extreme weather events such as hurricanes is classified as a __________ threat.
Match the following types of threats with their definitions:
Match the following types of threats with their definitions:
Which of the following is considered a physical threat to an organization?
Which of the following is considered a physical threat to an organization?
Vulnerabilities can exist even when no threats are present.
Vulnerabilities can exist even when no threats are present.
Name one source that can help identify vulnerabilities in an organization.
Name one source that can help identify vulnerabilities in an organization.
Previous security incidents help justify __________ in an organization.
Previous security incidents help justify __________ in an organization.
Match the sources with their purposes:
Match the sources with their purposes:
What type of malware involves disrupting service to users?
What type of malware involves disrupting service to users?
Incident response teams are typically a hindrance to understanding security incidents.
Incident response teams are typically a hindrance to understanding security incidents.
What is the main purpose of analyzing trouble reports?
What is the main purpose of analyzing trouble reports?
Which of the following is NOT considered a hidden cost associated with system/application control implementation?
Which of the following is NOT considered a hidden cost associated with system/application control implementation?
A threat is a circumstance that always leads to a loss.
A threat is a circumstance that always leads to a loss.
What are the three common security objectives for information systems?
What are the three common security objectives for information systems?
If the costs of implementing a control outweigh the benefits, the risk may be ________.
If the costs of implementing a control outweigh the benefits, the risk may be ________.
Match the type of server with its primary function:
Match the type of server with its primary function:
Which of the following practices is essential for protecting servers in the System/Application Domain?
Which of the following practices is essential for protecting servers in the System/Application Domain?
Knowledge of security issues with specific servers is generally widespread among all technicians.
Knowledge of security issues with specific servers is generally widespread among all technicians.
Threats, vulnerabilities, and impact are key elements in assessing the ________ of a business asset.
Threats, vulnerabilities, and impact are key elements in assessing the ________ of a business asset.
What is the primary goal of confidentiality in security?
What is the primary goal of confidentiality in security?
Hashing is used to ensure the confidentiality of data.
Hashing is used to ensure the confidentiality of data.
What is a vulnerability in the context of security?
What is a vulnerability in the context of security?
The value of losses can sometimes be described in terms of high, medium, or _____ when monetary terms are not applicable.
The value of losses can sometimes be described in terms of high, medium, or _____ when monetary terms are not applicable.
Which of the following techniques is commonly used to protect availability?
Which of the following techniques is commonly used to protect availability?
A locked door to a server room represents an administrative vulnerability.
A locked door to a server room represents an administrative vulnerability.
What is one method used to protect the integrity of data?
What is one method used to protect the integrity of data?
Match the security concepts with their definitions:
Match the security concepts with their definitions:
What is the primary focus of controls in risk management?
What is the primary focus of controls in risk management?
Risk management is a one-time process.
Risk management is a one-time process.
What must management consider when making decisions on risk controls?
What must management consider when making decisions on risk controls?
The role of a __________ is primarily concerned with protecting IT systems and balancing security costs.
The role of a __________ is primarily concerned with protecting IT systems and balancing security costs.
Which role is often the first line of defense for IT support?
Which role is often the first line of defense for IT support?
Management is primarily focused on security when considering risk.
Management is primarily focused on security when considering risk.
Match the following roles with their primary concerns regarding risk management:
Match the following roles with their primary concerns regarding risk management:
The process of evaluating implemented controls to ensure their effectiveness is known as __________.
The process of evaluating implemented controls to ensure their effectiveness is known as __________.
Which risk management technique involves eliminating the source of a risk?
Which risk management technique involves eliminating the source of a risk?
Risk management aims to completely eliminate all risks faced by an organization.
Risk management aims to completely eliminate all risks faced by an organization.
What is the ultimate goal of risk management?
What is the ultimate goal of risk management?
The technique of __________ involves shifting responsibility for a risk to another party.
The technique of __________ involves shifting responsibility for a risk to another party.
Match the following risk management techniques with their descriptions:
Match the following risk management techniques with their descriptions:
Which of the following is a method of risk transfer?
Which of the following is a method of risk transfer?
Mitigation of risk can involve moving an asset to reduce its exposure.
Mitigation of risk can involve moving an asset to reduce its exposure.
Name one risk management technique that allows an organization to continue facing a known risk.
Name one risk management technique that allows an organization to continue facing a known risk.
Flashcards
Risk Management
Risk Management
The process of identifying, assessing, and mitigating risks to protect an organization's assets.
Controls
Controls
Measures implemented to reduce vulnerabilities and minimize the impact of potential threats.
Evaluation of Controls
Evaluation of Controls
The evaluation of implemented controls to ensure their effectiveness in mitigating risks.
Role-Based Perceptions of Risk
Role-Based Perceptions of Risk
Signup and view all the flashcards
Management's Perception of Risk
Management's Perception of Risk
Signup and view all the flashcards
System Administrator's Perception of Risk
System Administrator's Perception of Risk
Signup and view all the flashcards
Tier 1 Administrator's Perception of Risk
Tier 1 Administrator's Perception of Risk
Signup and view all the flashcards
Balancing Security and Usability
Balancing Security and Usability
Signup and view all the flashcards
Loss of Confidentiality
Loss of Confidentiality
Signup and view all the flashcards
Loss of Integrity
Loss of Integrity
Signup and view all the flashcards
Loss of Availability
Loss of Availability
Signup and view all the flashcards
External Threats
External Threats
Signup and view all the flashcards
Internal Threats
Internal Threats
Signup and view all the flashcards
Vulnerability
Vulnerability
Signup and view all the flashcards
Threat
Threat
Signup and view all the flashcards
Audit logs
Audit logs
Signup and view all the flashcards
Trouble reports
Trouble reports
Signup and view all the flashcards
Prior events
Prior events
Signup and view all the flashcards
Incident response teams
Incident response teams
Signup and view all the flashcards
Audits
Audits
Signup and view all the flashcards
Firewall logs
Firewall logs
Signup and view all the flashcards
Risk Avoidance
Risk Avoidance
Signup and view all the flashcards
Risk Transfer
Risk Transfer
Signup and view all the flashcards
Risk Mitigation
Risk Mitigation
Signup and view all the flashcards
Risk Acceptance
Risk Acceptance
Signup and view all the flashcards
Risk Avoidance Rationale
Risk Avoidance Rationale
Signup and view all the flashcards
Risk Avoidance: Source Elimination
Risk Avoidance: Source Elimination
Signup and view all the flashcards
Risk Avoidance: Asset Relocation
Risk Avoidance: Asset Relocation
Signup and view all the flashcards
Risk Transfer: Outsourcing
Risk Transfer: Outsourcing
Signup and view all the flashcards
Hidden Costs of Control Implementation
Hidden Costs of Control Implementation
Signup and view all the flashcards
System/Application Domain
System/Application Domain
Signup and view all the flashcards
Best Practices for System/Application Domain Security
Best Practices for System/Application Domain Security
Signup and view all the flashcards
Specialization in System/Application Domain Security
Specialization in System/Application Domain Security
Signup and view all the flashcards
Server Security Based on Hosted Application
Server Security Based on Hosted Application
Signup and view all the flashcards
Impact
Impact
Signup and view all the flashcards
CIA Triad
CIA Triad
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Integrity
Integrity
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
Threat Mitigation
Threat Mitigation
Signup and view all the flashcards
Risk Assessment
Risk Assessment
Signup and view all the flashcards
Study Notes
Security Risk Management and Ethics
- This chapter covers risk management, risk identification techniques, and risk management techniques.
- Risk management is the practice of identifying, assessing, controlling, and mitigating risks.
Chapter 2: Topics
- What risk management is and how it's important to the business.
- What risk identification techniques are.
- What risk management techniques are.
Chapter 2: Goals
- Define risk management.
- Describe risk management techniques.
- Describe risk identification techniques.
- Explain the relationship between the cost of loss and the cost of risk management.
- Explain the risk management lifecycle.
Risk Management and Its Importance to the Organization
- Risk management is the practice of identifying, assessing, controlling, and mitigating risks.
- Threats and vulnerabilities are key drivers of risk.
- Identifying relevant threats and vulnerabilities is crucial.
- Risk management aims to minimize risks, not eliminate them.
Risk Management and Its Importance to the Organization Cont.
- Risk management includes risk assessment.
- Risk assessment involves identifying IT assets, threats and vulnerabilities, likelihood of exploitation, and impact.
- Prioritize risks with higher impact first.
Risk Management and Its Importance to the Organization Cont.
- (2) Identifying risks to manage - A company can choose to avoid, transfer, mitigate, or accept risks, often based on the likelihood and impact of the risk.
- (3) Selection of controls- Control methods, also called countermeasures, are used to reduce vulnerabilities and impact.
Risk Management and Its Importance to the Organization Cont.,
- (4) Implementation and testing of controls: Controls should be implemented and tested to ensure they provide the expected protection.
- (5) Evaluation of controls: Controls should be regularly assessed to ensure continued effectiveness, often by performing vulnerability assessments.
Role-Based Perceptions of Risk
- Personnel within an organization may have different perceptions of risk, and this can impact risk management.
- Balancing security and usability is a challenge in effective risk management.
- Achieving this balance requires understanding role-specific perceptions.
Role-Based Perceptions of Risk Cont.,
- Management is primarily concerned with company profitability and survivability.
- Management needs accurate data to make sound decisions on the controls to implement.
Role-Based Perceptions of Risk Cont.,
- System administrators focus on protecting IT systems and often want strict security measures, potentially neglecting usability.
Role-Based Perceptions of Risk Cont.,
- Tier 1 administrators, the first line of IT support, may prioritize user needs and usability over security.
Role-Based Perceptions of Risk Cont.,
- Developers can sometimes view security as an afterthought in the development cycle.
Role-Based Perceptions of Risk Cont.,
- End users prioritize usability and may try to circumvent security controls, potentially leading to security vulnerabilities.
Risk Identification Techniques
- Risk is the likelihood of a loss occurring, resulting from a threat exploiting a vulnerability.
- To identify risks, threats, vulnerabilities and likelihood of attack must be determined.
Step One: Identifying Threats
- Threat identification is the process of listing all possible threats to an organisation.
- A threat is any circumstance or event potentially causing a loss.
- Threats are categorized as external/internal and natural/man-made. Also, intentional and accidental.
Step One: Identifying Threats Cont..
- External threats originate outside the organization, including external attackers.
- Internal threats originate within the organization, potentially involving employees or other personnel.
- Natural threats refer to weather-related events, while man-made threats include human actions. Intentional threats are deliberate attempts to compromise security, while accidental threats include employee errors or mistakes.
Step One: Identifying Threats Cont...
- Example threats include unauthorized employee access, malware, website defacement, DoS/DDoS attacks, data loss, service disruptions, social engineering, natural disasters, and intentional compromise attempts.
Step Two: Identifying Vulnerabilities
- A vulnerability is a weakness that can be exploited by a threat.
- System logs (such as audit logs, firewall logs, and DNS logs), trouble reports, prior security events, and incident response team reports are valuable sources of information used to identify vulnerabilities.
- Vulnerabilities are often related to a lack of access control. Often vulnerabilities are not immediately apparent, and may be hidden or difficult to identify.
Step Two: Identifying Vulnerabilities Cont..
- (2) Trouble reports are used to identify trends and weaknesses in a company's IT infrastructure.
- (3) Prior events, such as previous security incidents, are invaluable sources to analyze potential risks, and show trends and areas where controls are lacking.
- (4) Incident response teams investigate and document security incidents, offering a wealth of information.
- (5) Audits verify compliance with company rules, regulations and laws, often uncovering potential weaknesses.
- (6) Certification and accreditation records show how a company's systems conform to security standards which can uncover existing and potential weaknesses.
Step Three: Estimate the Likelihood of a Threat Exploiting a Vulnerability
- This involves analyzing how threats can intersect with vulnerabilities across different domains.
- Assessing vulnerabilities in user accounts, workstations, networks, and the broader network environment is critical in this process.
Step Three: Estimate the Likelihood... Cont.
- Common domains include: user, workstation, lan, lan-to-wan, wan-domain, remote access, and system/application domains.
- Example incidents involving a user account domain could be social engineering, such as an attempted phishing attack. Workstations could be impacted by viruses, and compromised networks may result in DDoS attacks.
Pairing Threats with Vulnerabilities
- Match threats to vulnerabilities to estimate risk likelihood.
- Use the formula: Risk = Threat × Vulnerability
- Examples of pairing, and their impact, are presented (e.g., unauthorized employee access coupled with lack of authentication can greatly impact confidentiality).
Risk Management Techniques
- Risk management involves deciding what to do about identified risks.
- Risk Management is not Risk Elimination.
- The ultimate goal is to protect the organization.
- Options include Avoidance, Transfer, Mitigation, and Acceptance.
(1) Avoidance
- Avoid a risk by eliminating the source of the risk or moving the susceptible asset.
- Example: Remove a wireless network if it poses significant security risk and isn't critical, or move a data centre to a safer location.
(2) Transfer
- Transfer the risk to another party.
- Example: Purchasing insurance to cover potential losses, or outsourcing an activity.
(3) Mitigation
- Reduce the risk by reducing vulnerabilities or implementing controls, and/or taking steps to reduce the risk.
- Examples include altering physical environment, changing procedures, adding fault tolerance, and employee training.
(3) Mitigation Cont.,
- This involves technical mitigation such as firewall hardening, implementing antivirus, updating systems, and other security controls.
- Important to implement measures that will not exceed the benefit of avoiding a risk. Costs need to be analyzed and quantified.
(3) Mitigation Cont.,
- Cryptography can also be used to make attacks more costly, such as encrypting data.
(4) Acceptance
- Accept a risk if the cost of controlling it outweighs the potential loss.
- Cost-benefit analysis shows if a control is justified, often used to make this decision.
Cost-Benefit Analysis
- Any organization must perform a cost-benefit analysis (CBA) to help determine which controls or countermeasures to implement.
- This compares business impacts to the costs of controls, so that the benefits outweigh the cost.
Cost-Benefit Analysis Cont..
- CBA gathers data on control costs and benefits, including operational costs
- Also considers future costs. Benefits must outweigh the cost, or risk mitigation is not justified.
(7) Risk on System/Application Domain
- Servers (like mail servers, database, and DNS) containing applications are vulnerable to various types of risks.
(7) Risk on System/Application Domain Cont..
- Protecting servers, using best practices, and regularly patching/updating them is critical.
Threats, Vulnerabilities, and Impact
- Threats are attempts to exploit vulnerabilities, often leading to loss.
- Impact refers to the severity of a loss and can be expressed in monetary or descriptive terms.
Threats, Vulnerabilities, and Impact Cont..
- Common security vulnerabilities for information systems include confidentiality, integrity and availability. These aspects of security are often examined in a triangle.
Threats, Vulnerabilities, and Impact Cont..
- High impact losses include costly asset and resource loss.
- Medium impact losses include the loss of assets impacting organizational mission, reputation and interest; human injury is possible.
- Low impact losses include any other noticeable affect on organization's mission, reputation and interest
Threats, Vulnerabilities, and Impact Cont.,
- Implementing security controls and following security best practices help protect valuable business assets and data, thus reducing the impact of threats and vulnerabilities.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.