Risk Mitigation in Cybersecurity

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/54

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:25 PM on 5/3/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

55 Terms

1
New cards

BCP (Business Continuity Plan)

Plan that ensures mission critical systems CONTINUE to function after a disaster.

2
New cards

Risk

likelihood or probability that something unexpected will occur

3
New cards

T/F Risk is the process of identifying, assessing, controlling, and eliminating risk.

False

4
New cards

Confidentiality

Keeping organizational information hidden and secured. (Can the bad guys see the stuff?) (Passwords and encryption)

5
New cards

Integrity

Keeping data the same and accurate. (Can the bad guys change our data?) (Hash functions)

6
New cards

Availability

Keeping the servers up and making sure everything is running. (Can the bad guys take our stuff down?) (Failover cluster)

7
New cards

User Domain

the employee using the system. Beware of human error!

8
New cards

Workstation Domain

The computer being used by employees. Beware of viruses.

9
New cards

LAN Domain

Domain that connects all devices from the switch, to the router.

10
New cards

LAN - WAN Domain

Infrastructure that connects the LAN to the Wide Area Network (Internet)

11
New cards

WAN Domain

Infrastructure where all external users exist in

12
New cards

Remote Access Domain

Where employees can gain access to the IT infrastructure remotely

13
New cards

System App. Domain

System and software applications that users have access to.

14
New cards

(FISMA) Federal Information Security Management Act

Federal Law that ensures federal agencies protect their systems and data, comply with elements of the law, and integrate security in all processes

15
New cards

(HIPAA) Health Insurance Portability and Accountability Act

Compliance law that forces any institution that has medical data to protect health information.

16
New cards

(GLBA) Gramm Leach Bliley Act

Banks, Brokerage companies, and Insurance companies. Financial Privacy Rule (Notify customers about privacy practices) Safeguards Rule (Security to protect customer information)

17
New cards

FERPA (Family Educational Rights and Privacy Act)

Applies to all educational institutions. Students younger than 18 can have parents inspect records. Protects PII for students

18
New cards

COPPA (Children's Online Privacy Protection Act)

Protects the privacy of students 13 and younger

19
New cards

NIST

promotes innovation and competitiveness among US businesses. Invokes businesses to act reasonably.

20
New cards

PCI DSS (Payment Card Industry Data Security Standard)

Standard for any business that accepts payment cards.

21
New cards

GDPR (General Data Protection Regulation)

Regulates how companies protect the personal data of EU citizens and those in the European Economic Area

22
New cards

Intentional Threats

Acts that are hostile to an organization on purpose

23
New cards

DMZ

Zone between the Internet and the Internal network. It is used as a security checkpoint for data to keep external users out of the internal network.

24
New cards

SOX Sarbanes Oxley Act

regulatory framework aims to enhance the accuracy and reliability of financial reporting within publicly traded companies

25
New cards

Residual Risk

the risk that remains after management implements internal controls or some other response to risk

26
New cards

Security and Usability Balance

Too much security reduces usability. Too much usability has less security.

27
New cards

Vulnerability

Weakness in a system that can be exploited by a threat actor

28
New cards

Physical Controls

Locked Doors, Security Guards, ID cards

29
New cards

Technical Controls

Software installed on a system to make it more secure

30
New cards

Procedural Controls

Policies and procedures made by management

31
New cards

CBA

Is the risk worth the money to reduce it?

32
New cards

Quantitative Risk Assessment

Using financial numbers and values to determine the objective losses that could be possible.

33
New cards

Qualitative Risk Assessment

Using judgment to categorize risks. it is based on impact and likelihood of occurrence. Usually conducted by experts.

34
New cards

Annual Loss Expectancy ALE

The single loss expectancy x the annual rate of occurance

35
New cards

Single Loss Expectancy SLE

The expected monetary loss every time a risk occurs.

36
New cards

Annual Rate of Occurrence ARO

how many times the loss will occur in a year

37
New cards

Safeguards

A fun and fancy way to say "controls"

38
New cards

Hot Site

A site that can get the organization up and running very quickly. Equipped with everything the organization needs. Very Expensive.

39
New cards

Cold Site

A building the organization can relocate to incase of an emergency. Has nothing in it. Bare bones. Very cheap.

40
New cards

Warm Site

Compromise between a cold and a hot site.

41
New cards

Mobile Site

A mobile vehicle that can cover a large area between business locations. Similar to a warm site in the way it functions.

42
New cards

Vulnerability Assessment

An assessment that will SHOW all possible vulnerabilities in the organizations.

43
New cards

Pen Test (Exploit Assessment)

An assessment that will discover vulnerabilities in an organization and will exploit them to see the actual damage that could be caused.

44
New cards

DRP (Disaster Recovery Plan)

Plan that helps identify steps needed to restore a FAILED system

45
New cards

BIA (Business Impact Analysis)

Analysis that sees how exploited vulnerabilities could affect the business.

46
New cards

Symmetrical Encryption

A shared key usually used privately between two people. The key is the same for both people. If a message is encrypted with the key, it is decrypted with the same key.

47
New cards

Asymmetrical Encryption

A two-pair key system using a public key and a private key. The public key is given to everyone while the private key is not shared at all. Bob gives Alice his public key. Alice uses that key to encrypt her message to Bob. Bob then uses his private key to decrypt it. Vice versa, Alice will give Bob her public key.

48
New cards

Historical Data

Looking at security footage, company records, or searching the internet for stories on a specific security incident that may have already happened within the organization.

49
New cards

Principle of Least Privilege

information security concept which maintains that a user or entity should only have access to the resources and applications needed to complete a required task. New employees should not have admin privileges

50
New cards

Principle of Need to Know

You want to ensure that users are granted only the permissions needed to access data required to perform their jobs. New employees do not need to see other individuals emails unless they are sent to them.

51
New cards

Intrusion Detection System (IDS)

Application that will flag any errors or unordinary occurrences in the system. False positives are possible and missed intrusions are also possible.

52
New cards

Intrusion Protection System (IPS)

Application that will try to actively deal with any detected threats.

53
New cards

TCP threeway-hankshake

Host sends the server a SYN packet. Server responds with a SYN-ACK packet. Host responds with an ACK packet. If the Server's port is closed it will respond with an RST packet rather than a SYN-ACK

54
New cards

TCP attack

Host sends the server a SYN packet. Server responds with a SYN-ACK packet. Host withholds the ACK packet, confusing the server

55
New cards

Threat Modeling

Thinking like a criminal to determine all vulnerabilities and possible threats for the future.
· WHAT SYSTEM NEEDS TO BE PROTECTED
· IS THE SYSTEM SUSCEPTIBLE TO ATTACKS?
· WHO ARE THE POTENTIAL ADVISARIES?
· HOW WOULD AN ADVISARY ATTACK?
· IS THE SYSTEM SUSCEPTIBLE TO HARDWARE OR SOFTWARE FAILURE?
· WHO ARE THE USERS
· HOW MIGHT AN INTERNAL USER MISUES THE SYSTEM?