Risk Management and Access Control

0.0(0)
studied byStudied by 2 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

Business Continuity Plan (A. Edris)

how an organization will recover and restore partially or completely interrupted critical function(s) after a disaster or extended disruption

2
New cards

Risk mitigation plans (A. Edris)

Identify, assess and prioritize risks and plan responses to deal with the impact of these risks on the operation of the business

3
New cards

Risk (N. Juaneza)

The chance a vulnerability will be exploited by a threat actor.

4
New cards

Improper Access Control (N. Juaneza)

weak defenses that an attacker can easily compromise.

5
New cards

Quantitative risk: ALE (T. Singh)

Expected yearly cost of a specific risk. Formula: Single Loss Expectancy (SLE) × Annualized Rate of Occurrence (ARO)

6
New cards

Compensative (K.Zhuang)

talks about how an different action is done to offset the risks when the primary control is not able to be used or not being fully effective.

7
New cards

MTTR (T. Singh)

measuring the average time it takes for a security team to clean up a incident, from when the alert is triggered to when the threat is fully mitigated and the system is restored.

Formula: Total time spent on repairs ÷ Number of repairs.

8
New cards

Corrective (K.Zhuang)

Talks about the actions that they do after something has happened to fix or mitigate the problem to operate how they were before the incident.

9
New cards

MTD(Maximum Tolerable Downtime) - (M.Patel)

The longest time a business can be down before it causes harm to the business

10
New cards

Risk Transfer (Konrad M.)

Risk management strategy where you pay another party to take responsibility of mitigating the risk.

Ex: Purchasing Insurance.

11
New cards

Impact (B. Concepcion)

damage done to an organization as a result of an attack

12
New cards

AIS (Automated Indicator Sharing) (B. Concepcion)

a CISA service that allows the sharing of attack indicators between government organizations and private organizations

13
New cards

DR site risk assessment (Konrad M.)

The process of identifying, evaluating and prioritizing potential hazards and vulnerabilities that could disrupt business operations.

14
New cards

What is a Dial up modem (K. Simon)

Converts digital data into analog audio data that can be transfered over the phone and vise versa

15
New cards

External Risk (Hussain A.)

Cyber threat actors who have no authorized access or natural/human made disasters

16
New cards

SLE (eli smith)

single loss expectancy.

SLE = AV x EF (asset value times exposure factor)

17
New cards

IOA (eli smith)

indicators of attack

18
New cards

Risk Avoidance (C.Harrison)

avoiding any exposure to risk by getting rid of the activity. example is getting rid of Wi-fi when there is a threat to your Wi-fi getting hacked.

19
New cards

What is a War dialer? (K. Simon)

A tool that dials many numbers to find numbers that connect to modems, fax machines, or others.

20
New cards

MEF (Bradley S.)

a global industry association that defines service standards, frameworks, and certification programs for network, cloud, and technology providers. Strong focus on automated digital systems.

21
New cards

Cybersecurity Infrastructure and Security Agency (CISA) (Hussain A.)

Leading efforts to automate the sharing of cybersecurity information for free

22
New cards

Disaster Recovery: functional exercises (T. Kashyap)

Essentially a drill of the recovery processes required when there is a disaster.

23
New cards

Detective Control(T. Kashyap)

Will not prevent an attack, but will record any attempts and alert someone.

24
New cards

Quantitative Risk Assessment: Exposure Factor (Manas Nagelia)

The percent of the value of an asset that would be lost in a single threat

25
New cards

Risk Acceptance(Dominic Downey)

Deciding it costs more to try and mitigate an attack than to allow the potential risk

26
New cards

Internal Risk Example (Yubraj G.)

Example: Students, Teachers, Administrators, Staff, Contractors

27
New cards

Risk Management (A. Corn)

How someone responds to a risk.

Ex. Accepting the risk, Hiring a 3rd party, Mitigating the risk.

28
New cards

IOC indactors of Compromise (C.Hickman)

An weird file transfer late at night to an address you dont remember.

29
New cards

MTTF (I. Swain)

the average amount of time it takes for a network to stop functioning under normal conditions

30
New cards

exploit (C. Harrison)

a method used to take advantage of a vulnerability to endanger an asset.

31
New cards

DR plans (I. Swain)

a series of steps used to correct a system after an inference- Cisco Talos creates these

32
New cards

Security Control: Deterrent (Preston L.)

The use of prevention measures to restrict behaviors; these could include security cameras or active security guards.

33
New cards

Security Control: Recovery (Preston L.)

Built-in measures to recover losses after a security breach or error. Examples:

-Data back-ups in the event of data corruption or a threat actor transferring/withholding data

-Fault tolerance drive systems

34
New cards

quantitative risk: ARO (Victoria O.)

annualized rate of occurrence, ARO = ALE/SLE

35
New cards

What is RPO (Recovery point objective)

the amount of data or time loss a company can take after a data loss disaster

36
New cards

Vulnerability (A. Corn)

A weakness in a system that can be exploited.

37
New cards

Environmental Disaster (Manas Nagelia)

Damages coming from nature, like earthquakes, storms, floods, etc that damage business operations

38
New cards

External Risk Examples (Hussain A.)

- Black Hat Hackers

- Grey Hat Hackers

- Tsunami

39
New cards

DR (Disaster Recovery): Person Made (Elias C.)

Deals with the recovery of man-made disasters such as a cyberattacks or human error.

40
New cards

Internal Risk (Yubraj G.)

Potential threats from within an organization that can lead to legal or financial problems

41
New cards

NCSA (National Cyber Security Alliance) (Kevin W.)

Organization which spreads cybersecurity to the public. Promotes NCASM with CISA each each October.

42
New cards

RTO (Recovery Time Objective) (Kevin W.)

The target time by organizations/companies to restore system function. More critical objectives have a lower time.

43
New cards

Risk Mitigation (C.Hickman)

Ways to reduce the risk of an attack happening by making your network safer. Ex. Adding better passwords or encrypting messages

44
New cards

Devices used for hacking in 1980's? (K. Simon)

Blue box, red box, Dial up modems, War dialers

45
New cards

Business Continuity Planning (Yubraj G.)

Identifying threats and making a plan to maintain functions and services after the disruption

46
New cards

Countermeasure (David A.)

Things that an organization may do in order to protect assets

47
New cards

MTBF ( Hannan H.)

The average amount of time a device is expected to work before it fails.

48
New cards

First Hacking Attacks (Kevin W.)

-War dialing: Using automated systems to dial numbers to find lines with connected devices.

-Brute forcing: Trying default and common usernames and passwords to get into systems.

-Phreaking: Using tools and methods to manipulate telephone communications (e.g using a bluebox to mimic certain tones)

49
New cards

DR: table top excercises (Bradley S.)

A organization's key personnel work through a simulation of possible cyberattack or disaster scenarios. They develop a disaster recovery plan.

50
New cards

Threat

Possible danger to an "asset" which could be data or the network itself

51
New cards

Attack Surface(Dominic Downey)

All the points a hacker could try to get unauthorized access into the network

52
New cards

Attack Vector ( Hannan H. )

The method or path that a hacker uses to gain unauthorized access to a system.

53
New cards

Functional Security Controls: Preventive (T. Kashyap)

Security measures that are designed to prevent unauthorized/unwanted activities from happening.

54
New cards

DR (Disaster Recovery): Full Scale Exercises (Elias C.)

Realistic simulations/tests of the ability of an organization to recover from major cyberattacks.

55
New cards

MTD (Maximum Tolerable Downtime) (M.Patel)

The longest time a business can be disrupted before it is harmful to the business.

56
New cards

Business Impact Analysis (J.Oppong)

Calculating the impact of loss that may occur for multiple threat scenarios.