Podcast
Questions and Answers
What is a common motivation for perpetrators in committing attacks?
What is a common motivation for perpetrators in committing attacks?
- Desire for knowledge
- Greed (correct)
- Curiosity
- Need for security
Which of the following is NOT considered a best practice for managing IT threats?
Which of the following is NOT considered a best practice for managing IT threats?
- Use automation
- Ignore access controls (correct)
- Provide training
- Create a security policy
What occurs when a threat exploits a vulnerability?
What occurs when a threat exploits a vulnerability?
- Security policy implementation
- Threat/vulnerability pair (correct)
- Risk control
- Mitigation technique
What is one way to reduce potential risks associated with vulnerabilities?
What is one way to reduce potential risks associated with vulnerabilities?
What is an exploit in the context of IT security?
What is an exploit in the context of IT security?
What is the term for the risk that remains after steps have been taken to reduce it?
What is the term for the risk that remains after steps have been taken to reduce it?
Which technique is primarily used in risk management?
Which technique is primarily used in risk management?
What is a significant risk associated with the User Domain in IT security?
What is a significant risk associated with the User Domain in IT security?
What type of threats includes natural events and human errors?
What type of threats includes natural events and human errors?
Which of the following accurately describes the Workstation Domain?
Which of the following accurately describes the Workstation Domain?
How can businesses manage environmental threats?
How can businesses manage environmental threats?
Which statement is true regarding threats?
Which statement is true regarding threats?
What distinguishes the LAN Domain from the WAN Domain?
What distinguishes the LAN Domain from the WAN Domain?
What is the equation that describes the relationship between risk, vulnerability, and threats?
What is the equation that describes the relationship between risk, vulnerability, and threats?
What is a primary function of the Remote Access Domain?
What is a primary function of the Remote Access Domain?
Which of the following is NOT a method to address unintentional threats?
Which of the following is NOT a method to address unintentional threats?
Which domain represents an untrusted zone in the IT infrastructure?
Which domain represents an untrusted zone in the IT infrastructure?
Which of the following vulnerabilities is specific to the LAN Domain?
Which of the following vulnerabilities is specific to the LAN Domain?
What is a characteristic of intentional threats?
What is a characteristic of intentional threats?
What constitutes the System/Application Domain?
What constitutes the System/Application Domain?
What is the role of firewalls in the LAN-to-WAN Domain?
What is the role of firewalls in the LAN-to-WAN Domain?
What does risk primarily represent in a business context?
What does risk primarily represent in a business context?
Which of the following best defines a vulnerability in the context of risk management?
Which of the following best defines a vulnerability in the context of risk management?
How can risks to business functions affect overall business revenue?
How can risks to business functions affect overall business revenue?
Which type of asset is characterized by its measurable value to a business?
Which type of asset is characterized by its measurable value to a business?
What role does risk play in determining business costs?
What role does risk play in determining business costs?
What is the outcome of risks that lead to a compromise of business assets?
What is the outcome of risks that lead to a compromise of business assets?
How can implementing countermeasures help a business regarding risks?
How can implementing countermeasures help a business regarding risks?
In risk management, what can cause a business to fail?
In risk management, what can cause a business to fail?
What does the Domain Name System (DNS) do for clients?
What does the Domain Name System (DNS) do for clients?
What are the components of the security triad?
What are the components of the security triad?
Which step is crucial in identifying risks within risk management?
Which step is crucial in identifying risks within risk management?
What does residual risk refer to in risk management?
What does residual risk refer to in risk management?
Which of the following is not a step in the risk management process?
Which of the following is not a step in the risk management process?
How can organizations decide to handle risks?
How can organizations decide to handle risks?
What is the primary goal of risk management?
What is the primary goal of risk management?
What is a cost-benefit analysis (CBA) used for in risk management?
What is a cost-benefit analysis (CBA) used for in risk management?
Flashcards
Risk Management
Risk Management
The process of identifying, analyzing, and mitigating potential threats to an IT infrastructure.
Attacker
Attacker
A person who attempts to gain unauthorized access to a computer system or network.
User Domain
User Domain
The people who use a computer system, including employees, contractors, and consultants.
Workstation Domain
Workstation Domain
Signup and view all the flashcards
LAN Domain
LAN Domain
Signup and view all the flashcards
LAN-to-WAN Domain
LAN-to-WAN Domain
Signup and view all the flashcards
WAN Domain
WAN Domain
Signup and view all the flashcards
System/Application Domain
System/Application Domain
Signup and view all the flashcards
Vulnerability
Vulnerability
Signup and view all the flashcards
Exploit
Exploit
Signup and view all the flashcards
Mitigation
Mitigation
Signup and view all the flashcards
Threat/Vulnerability Pair
Threat/Vulnerability Pair
Signup and view all the flashcards
Security Policy
Security Policy
Signup and view all the flashcards
Threat
Threat
Signup and view all the flashcards
Impact
Impact
Signup and view all the flashcards
Risk Assessment
Risk Assessment
Signup and view all the flashcards
Residual Risk
Residual Risk
Signup and view all the flashcards
Cost-Benefit Analysis (CBA)
Cost-Benefit Analysis (CBA)
Signup and view all the flashcards
Security Triad
Security Triad
Signup and view all the flashcards
Risk
Risk
Signup and view all the flashcards
Loss
Loss
Signup and view all the flashcards
Business Functions
Business Functions
Signup and view all the flashcards
Business Assets
Business Assets
Signup and view all the flashcards
Risk Management Costs
Risk Management Costs
Signup and view all the flashcards
Domain-Based Risk Assessment
Domain-Based Risk Assessment
Signup and view all the flashcards
Risk mitigation
Risk mitigation
Signup and view all the flashcards
Unintentional Threats
Unintentional Threats
Signup and view all the flashcards
Intentional Threats
Intentional Threats
Signup and view all the flashcards
Study Notes
Risk Management Fundamentals
- Risk is the likelihood of a loss occurring, triggered when a threat exposes a vulnerability.
- Organizations of all sizes face risks, some severe enough to cause business failure, others minor enough to accept without further thought.
- Key elements of risk are threat, vulnerability, and loss.
- A threat is any activity representing a possible danger.
- A vulnerability is a weakness.
- A loss compromises business operations.
- Risks can lead to a loss negatively impacting a business.
- Types of business losses include: compromises in business functions, compromises in business assets, and drivers of business costs.
- Business function compromises affect product/service sales, leading to revenue loss.
- Examples include reduced sales representative capabilities (phone/email) or website outages.
- Compromise of business assets occurs when an asset has the potential of losing value. Assets are tangible (cost) and intangible (e.g., client confidence).
- Risk also drives business costs, which entails measures like antivirus software implementation to reduce risk.
- A method to examine risk is through seven typical IT infrastructure domains.
- These domains can be examined separately and represent potential targets for attackers.
- IT infrastructure domains are, user, workstation, LAN, LAN-to-WAN, WAN, remote access, and system/application.
- Vulnerabilities in one domain can put the entire system at risk.
- The user domain encompasses users, employees, contractors, and consultants—frequently the weakest link in IT security.
- Workstation computers are susceptible to malicious software (malware) if not kept updated with patches.
- The LAN domain is inside the firewall, and devices must have protection to prevent risk.
- The LAN-to-WAN domain connects to the wide area network (WAN), which is treated as an untrusted zone.
- Remote access domains allow access when workers are away from the company and often involve dial-up or VPN connections.
- The WAN domain is the Internet and hosts are at high risk of attack.
- The system/application domain refers to mail, database, application, and domain name servers.
- A threat exploiting a vulnerability results in a loss. Impact identifies loss severity.
- These threats are always present, and although not eliminable, they can be controlled.
- Protection of confidentiality, integrity, and availability (CIA triad) are common security objectives
- Risk management practices involve identifying, assessing, controlling, and mitigating risks.
- Identifying relevant risk threats and vulnerabilities for an organization is an important initial step.
- Risk management includes elements: Risk assessment, identifying risks to manage, selection of controls, implementation and testing of controls, and evaluating controls.
- Identifying risks requires determining threats, identifying vulnerabilities, and estimating exploit likelihoods.
- Risk management techniques involve taking steps to avoid, transfer, mitigate, or accept risk and employing a cost-benefit analysis.
- Residual risk is the risk that remains after applying controls.
- The primary risk management technique is risk mitigation (risk reduction/treatment).
Threats, Vulnerabilities, and Impact
- Threats are attempts to exploit vulnerabilities that result in loss of confidentiality, integrity, or availability.
- Threats are always present and cannot be eliminated—mitigation can manage potential.
Understanding and Managing Threats
- Threats are part of the risk equation (Risk x Vulnerability = Threat).
- Threats can be uncontrollable (natural events, human error, and simple accidents), intentional (hostile acts), or unintentional.
- Organizational risk management plans can reduce operational impacts.
Understanding and Managing Vulnerabilities
- Vulnerabilities are weakness in assets, systems, or processes.
- Vulnerabilities can be mitigated by reducing occurrence rates/loss impact.
- Mitigation techniques should consider technique value, initial cost, and ongoing costs.
Understanding and Managing Exploits
- Exploits are the act of taking advantage of a vulnerability to gain an advantage.
- Understanding exploits is important for risk reduction.
Best Practices for Managing Threats in Your IT Infrastructure
- Best practices include establishing security policies, obtaining insurance, implementing appropriate access controls, using automation tools, providing training, and implementing antivirus software.
- Protect the boundary of your IT infrastructure, using firewalls.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.