Term
(1) False Positive (2) False Negative |
|
Definition
(1) An event that appears to be a risk but turns out not to be one. (2) An event that does not appear to be a risk but turns out to be one. |
|
|
Term
|
Definition
Risk classification: Action that affects the long-term goals of the organization. |
|
|
Term
|
Definition
Risk classification: Following (or not following) a regulation or standard. |
|
|
Term
|
Definition
Risk classification: Impact of financial decisions or market factors. |
|
|
Term
|
Definition
Risk classification: Events that impact the daily business of the organization. |
|
|
Term
|
Definition
Risk classification: Events that impact the daily business of the organization. |
|
|
Term
|
Definition
Risk classification: Events that affect information technology systems. |
|
|
Term
|
Definition
Risk classification: Actions related to the management of the organization. |
|
|
Term
(1) Preventative - Controls that prevent the loss or harm from occurring based on the risk. (2) Detective - Controls that prevent the loss or harm from occurring based on the risk. (3) Corrective - Controls that restore the system back to its prior state before a malicious event occurred. |
|
Definition
Three elements of the simple risk model? |
|
|
Term
Management Risk Control Type |
|
Definition
Risk control type that is administrative in nature and consists of all the laws, regulations, policies, practices, and guidelines that govern the overall requirements and controls. |
|
|
Term
Technical Risk Control Type |
|
Definition
Risk control type that involves enforcing technology to control risk, such as antivirus software, firewalls, and encryption. |
|
|
Term
Operational Risk Control Type |
|
Definition
Risk control type that covers operational procedures to limit risk. |
|
|
Term
Management Risk Control Type |
|
Definition
Risk control type that is administrative in nature and consists of all the laws, regulations, policies, practices, and guidelines that govern the overall requirements and controls. |
|
|
Term
Technical Risk Control Type |
|
Definition
Risk control type that involves utilizing technology to control risk, such as antivirus software, firewalls, and encryption. |
|
|
Term
Operational Risk Control Type |
|
Definition
Risk control type that covers operational procedures to limit risk. |
|
|
Term
|
Definition
A subject's access level over an object. |
|
|
Term
|
Definition
The periodic review of a subject's privileges over an object. |
|
|
Term
|
Definition
A methodology for making modifications and keeping track of those changes. |
|
|
Term
|
Definition
The framework and functions required to enable incident response and incident handling within an organization. |
|
|
Term
Qualitative Risk Calculation |
|
Definition
Approach to risk calculation that uses an educated guess based on observation. |
|
|
Term
Quantitative Risk Calculation |
|
Definition
Approach to risk calculation that attempts to create hard numbers associated with the risk of an element in a system by using historical data. This calculates both the likelihood of a risk and the impact of a risk being successful. |
|
|
Term
Mean Time Between Failure (MTBF) |
|
Definition
Calculates the mean amount of time until a component fails completely and is irreparable, and therefore must be replaced. |
|
|
Term
Mean Time To Recovery (MTTR) |
|
Definition
Calculates the mean amount of time that it will take a device to recover from a failure to a working state. |
|
|
Term
Mean Time To Failure (MTTF) |
|
Definition
A basic measure of reliability for systems that cannot be repaired; or, the mean amount of time expected until the first failure of a piece of equipment. |
|
|
Term
|
Definition
The number of expected failures per one billion hours of operation for the device. |
|
|
Term
Annualized Rate Of Occurrence (ARO) |
|
Definition
The likelihood of a risk occurring within one year. |
|
|
Term
Single Loss Expectancy (SLE) |
|
Definition
The expected monetary loss each time a risk occurs. |
|
|
Term
Annualized Loss Expectancy (ALE) |
|
Definition
The expected monetary loss that can be expected for an asset due to a risk over a one year period. |
|
|
Term
|
Definition
Written document that states how an organization plans to protect the company’s information technology assets. |
|
|
Term
(1) Guideline (2) Standard (3) Policy |
|
Definition
Organizational rules: (1) Collection of suggestions that should be implemented. (2) Collection of requirements specific to the system or procedure that must be met by everyone. (3) Specific requirements or rules that must be met. |
|
|
Term
|
Definition
A systematic and methodical evaluation of the exposure of assets to attackers. |
|
|
Term
|
Definition
The obligations that are imposed on owners and operators of assets to exercise reasonable care of the assets and take necessary precautions to protect them. |
|
|
Term
Acceptable Use Policy (AUP) |
|
Definition
Policy that defines the actions users may perform while accessing systems and networking equipment. |
|
|
Term
|
Definition
Policy that outlines how an organization uses the personal information it collects. |
|
|
Term
|
Definition
Policy that address the different aspects of how data should be handled within an organization. |
|
|
Term
(1) Data Storage Policy (2) Data Retention Policy (3) Data Wiping and Disposing Policy |
|
Definition
Data Policies: (1) Policy that specifies data collection and storage procedures. (2) Policy that outlines how to maintain information in the user’s possession for a predetermined length of time. (3) Policy that addresses how and when data will be erased. |
|
|
Term
(1) Asset Identification (2) Threat Identification (3) Vulnerability Appraisal (4) Risk Assessment (5) Risk Mitigation |
|
Definition
The steps of vulnerability assessment? |
|
|
Term
|
Definition
Process used to predict what types of threats are most likely to occur and how to understand the attackers and their motivation. |
|
|
Term
|
Definition
Determining the damage that would result from an attack and the likelihood that the vulnerability is a risk to the organization. |
|
|
Term
|
Definition
The part of software code that can be executed by unauthorized users. |
|
|
Term
|
Definition
The practice of disabling unused ports in order to reduce the number of threat vectors. |
|
|
Term
|
Definition
The process of gathering information within a banner (a protocol message service containing information about that protocol, which is transmitted when a program connects to it). |
|
|
Term
|
Definition
Generic term for any product that looks for network or system vulnerabilities. |
|
|
Term
|
Definition
A decoy computer that is intentionally located in a limited security area, loaded with software and fake data files in order to appear authentic, and configured to have open vulnerabilities. The actual purpose of this computer is to lure in attackers in order to examine their attacks, or to distract them away from legitimate systems. |
|
|
Term
|
Definition
A network of honeypot systems which functions as a honeypot, and is used to examine network security concerns. |
|
|
Term
|
Definition
An automated software search for known security weaknesses. There are two types: intrusive (penetrative) and non-intrusive. |
|
|
Term
Penetration Testing OR Pentesting |
|
Definition
Vulnerability tests designed to exploit weaknesses found in vulnerable systems in order to document that information and report it to the organization. These are conducted by white hat hackers - independent contractors hired for ethical purposes. |
|
|
Term
(1) Black box (2) White Box (3) Grey Box |
|
Definition
Penetration tests: (1) Test intended to mimic an outside attack, in which the tester has no prior knowledge of the network that is being tested. (2) Test in which the tester has in-depth knowledge of the network being tested. (3) Test in which the tester has only certain limited information about the network being tested. |
|
|
Term
|
Definition
Combining systems and data with entities outside the organization. |
|
|
Term
|
Definition
The attempt to limit as many security risks as possible in order to make the system or network more secure. |
|
|
Term
(1) Due Process (2) Due Diligence |
|
Definition
(1) The principle of treating all accused persons in an equal fashion in the case that an employee is accused of a malicious action. (2) Policy stating that any investigation into suspicious employee conduct will examine all material facts. |
|
|