Term
What is the CIA of IT Security? |
|
Definition
Confidentiality, Integrity, Availability |
|
|
Term
Attributes of Threat Actors |
|
Definition
1. Internal or External 2. Level of Sophistication 3. Resources and Funding 4. Intention or Motivation 5. Use of open source intelligence |
|
|
Term
|
Definition
1. Script Kiddies 2. Hackivist 3. Organized Crime 4. Nation States 5. Insiders 6. Competitors |
|
|
Term
|
Definition
Advanced Persistent Threat |
|
|
Term
|
Definition
Some cause or social/political agenda |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Varies from mistakes to malicious threats |
|
|
Term
|
Definition
|
|
Term
Risk Management:
Term: Assets |
|
Definition
Any part of our infrastructure which we worry may be harmed.
Computers, Routers, employees, physical property, even reputation |
|
|
Term
Risk Management:
Term: Vunerablilities |
|
Definition
A weakness to an Asset that leaves it open to risk |
|
|
Term
Risk Management:
Term: Threats |
|
Definition
A discovered action which exploits a vulnerability's potential to harm an Asset |
|
|
Term
Risk Management:
Term: Threat Agent |
|
Definition
The source or initiator of the threat
i.e. Hacker, Hurrican, power outage |
|
|
Term
Risk Management:
Term: Likelihood |
|
Definition
The level of certainty that something will happen |
|
|
Term
Risk Management:
Term: Impact |
|
Definition
The actual harm caused by a threat |
|
|
Term
|
Definition
1. Quantitatively - cost, labor, time
2. Qualitatively - loss of projected business, loss of reputation, loss of trust |
|
|
Term
|
Definition
Threats applied to Vulnerabilities = Risk |
|
|
Term
What is the NIST SP 800-30? |
|
Definition
A Guide for Conducting Risk Assessments |
|
|
Term
What is the first step of Risk assessment? |
|
Definition
Catalog and define all the Assets
Assess Vulnerabilities and Threats |
|
|
Term
Name some Risk Assessment tools |
|
Definition
1. Nessus (a program which finds and reports vulnerabilities) 2. Penetration Testing or Pen-Testing (A third party company which will test your system for vulnerabilities and report the results) |
|
|
Term
What are types of Threats? |
|
Definition
1. Adversarial (intentional harm - hacker or malware) 2. Accidental (ID10T mistakes and errors) 3. Structural (Hardware & Software Malfunctions) 4. Environmental (earthquakes, power outages, ect) |
|
|
Term
|
Definition
1. Mitigation (An effort to fix or reduce risk) 2. Transference (Unload the risk, vulnerability, and impact to a third party) 3. Acceptance (Likelihood and Impact are less than the cost of mitigation) 4. Avoidance (Likelihood and Impact so high that we just do something else altogether) |
|
|
Term
What is a Risk Management Framework? |
|
Definition
A workflow or process to help you deal with risk management |
|
|
Term
What are the basic parts of every Risk Management Framework? |
|
Definition
1. Assessment 2. Implementation (Applying Security Controls) 3. Monitoring 4. Issue response |
|
|
Term
Types of Risk Assesment Guides |
|
Definition
1. Bench Mark (Thresholds by which to verify expected throughput values or actions) 2. Secure Configuration (These help to secure the stuff in your infrastructure. These tend to be platform or vendor specific) 3. General Purpose (these are broad guides) |
|
|
Term
What Are Security Controls? |
|
Definition
A mechanism applied to the IT infrastructure to 1. protect, or 2. Remedy security problems. |
|
|
Term
What are the different categories of Security Controls? |
|
Definition
1. Administrative or Management (policies, laws, ect) 2. Technical (Encryption, passwords, ect) 3. Physical (Keys, Cameras, ect) |
|
|
Term
What are the different security control functions |
|
Definition
1. Deterrent 2. Prevention 3. Detective 4. Corrective 5. Compensating |
|
|
Term
Interesting Security Controls |
|
Definition
1. Mandatory Vacations 2. Job Rotation 3. Multi-person control (two check signers) 4. Separation of Duties 5. Principle of least privilege (Need to Know) |
|
|
Term
|
Definition
1. Redundancy (same control applied in layers) 2. Diversity (different controls to reach the same result) |
|
|
Term
|
Definition
Rules for how we do IT Security in our organization. |
|
|
Term
What are the sources for IT Governance? |
|
Definition
1. Laws & Regulations 2. Standards (government or industry) 3. Best Practices 4. Common Sense |
|
|
Term
Documents used to practice IT Governance? |
|
Definition
1. Policies (lists the directives to be followed) 2. Organizational Standards (Exact Rules) 3. Procedures (step by step guides) |
|
|
Term
7 Important Security Policies to Know |
|
Definition
1. Acceptable Use 2. Data Sensitivity and Classification 3. Access Control 4. Password 5. Care and Use of Equipment 6. Privacy 7. Personnel |
|
|
Term
Describe the following type of security policy: Acceptable Use |
|
Definition
What a person can and cannot do with company assets. |
|
|
Term
Describe the following type of security policy: Data Sensitivity and Classification |
|
Definition
Defines how important different types of data are. |
|
|
Term
Describe the following type of security policy: Access Control |
|
Definition
Defines how people get access to our data and other resources |
|
|
Term
Describe the following type of security policy: Password |
|
Definition
Defines how we deal with passwords (i.e. Recovery, login, complexity, retention, re-uses) |
|
|
Term
Describe the following type of security policy: Care and Use of Equipment |
|
Definition
Deals with maintenance and physical use of Equipment |
|
|
Term
Describe the following type of security policy: Privacy |
|
Definition
How we handle the privacy of others |
|
|
Term
Describe the following type of security policy: Personnel |
|
Definition
How we handle the people who use or work with our data |
|
|
Term
Types of Risk Management Frameworks |
|
Definition
1. Regulatory 2. Non-regulatory 3. National Standards 4. International Standards 5. Industry Specific |
|
|
Term
Quantitative Risk Assessment Formula |
|
Definition
SLE (single loss Expectancy) x ARO (Annual Rate of Occurance) = ALE (Annual Loss Expectancy)
(SLE x ARO = ALE) |
|
|