Risk Mitigation in Cybersecurity

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 54

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

55 Terms

1

BCP (Business Continuity Plan)

Plan that ensures mission critical systems CONTINUE to function after a disaster.

New cards
2

Risk

likelihood or probability that something unexpected will occur

New cards
3

T/F Risk is the process of identifying, assessing, controlling, and eliminating risk.

False

New cards
4

Confidentiality

Keeping organizational information hidden and secured. (Can the bad guys see the stuff?) (Passwords and encryption)

New cards
5

Integrity

Keeping data the same and accurate. (Can the bad guys change our data?) (Hash functions)

New cards
6

Availability

Keeping the servers up and making sure everything is running. (Can the bad guys take our stuff down?) (Failover cluster)

New cards
7

User Domain

the employee using the system. Beware of human error!

New cards
8

Workstation Domain

The computer being used by employees. Beware of viruses.

New cards
9

LAN Domain

Domain that connects all devices from the switch, to the router.

New cards
10

LAN - WAN Domain

Infrastructure that connects the LAN to the Wide Area Network (Internet)

New cards
11

WAN Domain

Infrastructure where all external users exist in

New cards
12

Remote Access Domain

Where employees can gain access to the IT infrastructure remotely

New cards
13

System App. Domain

System and software applications that users have access to.

New cards
14

(FISMA) Federal Information Security Management Act

Federal Law that ensures federal agencies protect their systems and data, comply with elements of the law, and integrate security in all processes

New cards
15

(HIPAA) Health Insurance Portability and Accountability Act

Compliance law that forces any institution that has medical data to protect health information.

New cards
16

(GLBA) Gramm Leach Bliley Act

Banks, Brokerage companies, and Insurance companies. Financial Privacy Rule (Notify customers about privacy practices) Safeguards Rule (Security to protect customer information)

New cards
17

FERPA (Family Educational Rights and Privacy Act)

Applies to all educational institutions. Students younger than 18 can have parents inspect records. Protects PII for students

New cards
18

COPPA (Children's Online Privacy Protection Act)

Protects the privacy of students 13 and younger

New cards
19

NIST

promotes innovation and competitiveness among US businesses. Invokes businesses to act reasonably.

New cards
20

PCI DSS (Payment Card Industry Data Security Standard)

Standard for any business that accepts payment cards.

New cards
21

GDPR (General Data Protection Regulation)

Regulates how companies protect the personal data of EU citizens and those in the European Economic Area

New cards
22

Intentional Threats

Acts that are hostile to an organization on purpose

New cards
23

DMZ

Zone between the Internet and the Internal network. It is used as a security checkpoint for data to keep external users out of the internal network.

New cards
24

SOX Sarbanes Oxley Act

regulatory framework aims to enhance the accuracy and reliability of financial reporting within publicly traded companies

New cards
25

Residual Risk

the risk that remains after management implements internal controls or some other response to risk

New cards
26

Security and Usability Balance

Too much security reduces usability. Too much usability has less security.

New cards
27

Vulnerability

Weakness in a system that can be exploited by a threat actor

New cards
28

Physical Controls

Locked Doors, Security Guards, ID cards

New cards
29

Technical Controls

Software installed on a system to make it more secure

New cards
30

Procedural Controls

Policies and procedures made by management

New cards
31

CBA

Is the risk worth the money to reduce it?

New cards
32

Quantitative Risk Assessment

Using financial numbers and values to determine the objective losses that could be possible.

New cards
33

Qualitative Risk Assessment

Using judgment to categorize risks. it is based on impact and likelihood of occurrence. Usually conducted by experts.

New cards
34

Annual Loss Expectancy ALE

The single loss expectancy x the annual rate of occurance

New cards
35

Single Loss Expectancy SLE

The expected monetary loss every time a risk occurs.

New cards
36

Annual Rate of Occurrence ARO

how many times the loss will occur in a year

New cards
37

Safeguards

A fun and fancy way to say "controls"

New cards
38

Hot Site

A site that can get the organization up and running very quickly. Equipped with everything the organization needs. Very Expensive.

New cards
39

Cold Site

A building the organization can relocate to incase of an emergency. Has nothing in it. Bare bones. Very cheap.

New cards
40

Warm Site

Compromise between a cold and a hot site.

New cards
41

Mobile Site

A mobile vehicle that can cover a large area between business locations. Similar to a warm site in the way it functions.

New cards
42

Vulnerability Assessment

An assessment that will SHOW all possible vulnerabilities in the organizations.

New cards
43

Pen Test (Exploit Assessment)

An assessment that will discover vulnerabilities in an organization and will exploit them to see the actual damage that could be caused.

New cards
44

DRP (Disaster Recovery Plan)

Plan that helps identify steps needed to restore a FAILED system

New cards
45

BIA (Business Impact Analysis)

Analysis that sees how exploited vulnerabilities could affect the business.

New cards
46

Symmetrical Encryption

A shared key usually used privately between two people. The key is the same for both people. If a message is encrypted with the key, it is decrypted with the same key.

New cards
47

Asymmetrical Encryption

A two-pair key system using a public key and a private key. The public key is given to everyone while the private key is not shared at all. Bob gives Alice his public key. Alice uses that key to encrypt her message to Bob. Bob then uses his private key to decrypt it. Vice versa, Alice will give Bob her public key.

New cards
48

Historical Data

Looking at security footage, company records, or searching the internet for stories on a specific security incident that may have already happened within the organization.

New cards
49

Principle of Least Privilege

information security concept which maintains that a user or entity should only have access to the resources and applications needed to complete a required task. New employees should not have admin privileges

New cards
50

Principle of Need to Know

You want to ensure that users are granted only the permissions needed to access data required to perform their jobs. New employees do not need to see other individuals emails unless they are sent to them.

New cards
51

Intrusion Detection System (IDS)

Application that will flag any errors or unordinary occurrences in the system. False positives are possible and missed intrusions are also possible.

New cards
52

Intrusion Protection System (IPS)

Application that will try to actively deal with any detected threats.

New cards
53

TCP threeway-hankshake

Host sends the server a SYN packet. Server responds with a SYN-ACK packet. Host responds with an ACK packet. If the Server's port is closed it will respond with an RST packet rather than a SYN-ACK

New cards
54

TCP attack

Host sends the server a SYN packet. Server responds with a SYN-ACK packet. Host withholds the ACK packet, confusing the server

New cards
55

Threat Modeling

Thinking like a criminal to determine all vulnerabilities and possible threats for the future.
路 WHAT SYSTEM NEEDS TO BE PROTECTED
路 IS THE SYSTEM SUSCEPTIBLE TO ATTACKS?
路 WHO ARE THE POTENTIAL ADVISARIES?
路 HOW WOULD AN ADVISARY ATTACK?
路 IS THE SYSTEM SUSCEPTIBLE TO HARDWARE OR SOFTWARE FAILURE?
路 WHO ARE THE USERS
路 HOW MIGHT AN INTERNAL USER MISUES THE SYSTEM?

New cards

Explore top notes

note Note
studied byStudied by 6 people
888 days ago
5.0(1)
note Note
studied byStudied by 13 people
330 days ago
5.0(1)
note Note
studied byStudied by 4 people
839 days ago
5.0(1)
note Note
studied byStudied by 1 person
809 days ago
5.0(1)
note Note
studied byStudied by 1 person
58 days ago
5.0(1)
note Note
studied byStudied by 8 people
788 days ago
5.0(1)
note Note
studied byStudied by 165 people
115 days ago
4.0(1)

Explore top flashcards

flashcards Flashcard (37)
studied byStudied by 16 people
792 days ago
4.7(3)
flashcards Flashcard (130)
studied byStudied by 3 people
672 days ago
5.0(1)
flashcards Flashcard (49)
studied byStudied by 4 people
120 days ago
5.0(1)
flashcards Flashcard (88)
studied byStudied by 170 people
547 days ago
5.0(3)
flashcards Flashcard (57)
studied byStudied by 1 person
29 days ago
5.0(2)
flashcards Flashcard (77)
studied byStudied by 8 people
493 days ago
5.0(1)
flashcards Flashcard (24)
studied byStudied by 3 people
833 days ago
5.0(1)
flashcards Flashcard (163)
studied byStudied by 185 people
421 days ago
5.0(1)
robot