Risk

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Risk

The possibility of negative impact on something

2
New cards

Vulnerability

A weakness that can be exploited by a threat

3
New cards

How are risks managed?

Applying controls to bring the risk to an acceptable level

4
New cards

Risk Assessments

Identifying and determining:

  • Impact

  • Likelihood

of a risk

5
New cards

Steps to conduct a risk assessment

  1. Identify potential hazards

  2. Idenitfy who could be harmed by the hazards

  3. Evaluate risk (severity and likelihood)

  4. Establish precautions

  5. Implement controls and record findings

  6. Review and re-assess

6
New cards

4 Ways to manage risk

  • Risk mitigation: applying technically controls (patches, firewalls) and administrative controls (policies, procedures)

  • Risk transfer: Shift cost of loss to somewhere else (insurance)

  • Risk accept: accept unavoidable risks and consequences

  • Risk avoid: Prevent risks by eliminating hazards

7
New cards

Policy

A plan of intent that outlines specific goals, principles, and courses of action for an organization.

8
New cards

Why are policies used?

Policies are used to provide guidance, ensure compliance with laws and regulations, and establish a framework for decision-making within an organization.

9
New cards

Common policy examples

Acceptable Use Policy (AUP): Defines user behaviour on the organisation’s network.ines consequences if violated

Service Level Agreement (SLA): Dictates services provided, performance level, response times, reprecussions if service not provided

Bring Your Own Device (BYOD): Establishes rules for personal device usage in the workplace.

Memorandum of Understanding (MOU): Formally outlines an agreement but is not legally binding (yet)

10
New cards

Standard Operating Procedures (SOP)

Step by step instructions for routine tasks to ensure consistency.

11
New cards

Compliance

Adherence to laws, regulations, and internal policies to ensure operational and legal integrity.

12
New cards

Why are compliance frameworks important?

  • Increase trust between customers and partners

  • Often legal requirement

  • Ensures good level of security (better equipped to respond to security events, reducing risk and impact)

13
New cards

GDRP General Data Protection Regulation

  • In EU law for data protection and privacy

  • Data controllers and processors must have technical and organisational measures to protect data privacy like anonymisation

  • They must have one of the following to store personal data:

    • Consent

    • contract

    • public task

    • vital interest

    • legitimate interest

    • legal requirement

  • Data controllers must disclose data collection, purpose, how long its retained

14
New cards

ISO 27001

Specifies management system for information security management control and requirements

Organisations meeting requirements can be certified after an audit

15
New cards

PCI DSS

  • Payment Card Industry Security Standard

  • For organisations handling major card brand payments

  • Reduce credit card fraud

  • Validation of compliance is based on how many transactions the org handles:

    • Self Assessment Questionnaire (SAQ) - smaller

    • External Qualified Security Assessor (QSA) - moderate

    • Firm specific Internal Security Assessor (ISA) - larger

16
New cards

HIPAA

Health Insurance Portability and Accountability Act

For orgs in US that handle health info and personal details

17
New cards

Technical controls for HIPAA

encryption, authentication, password complexity, access auditing, segmentation

18
New cards

Procedural controls for HIPAA

password policies, incident reponse plans, contingency plans, audit procedures

19
New cards

Change management

Ensuring changes in an org are planned, supported, documented, and auditable

In cybersecurity it lets us easily find accountability if a change results in a security risk

20
New cards

Patch Management

Ability to deploy patches and security fixes to IT assets

21
New cards

WSUS Windows server update services

  • Allows IT trams to deploy latest microsoft product updates

  • at least one WSUS server (updtream server) on the network must be able to connect to microsoft update to get update info

  • This means endpoints and servers dont need to have an internet connection to download patches themselves

22
New cards

SCCM Microsoft System Center Configuration Manager

  • Paid solution acting as asset inventory, software installation, deploys updates and security patches to systems across network

  • Uses Microsoft’s WSUS but also provides additional patch management control (when/how)

  • Made for windows systems primarily

23
New cards

Functionality offered by ManageEngine Patch Manager Plus

  • Deploy patches to windows, MacOS, Linux

  • update OS

  • update Microsoft office software

  • update 3rd party applications e.g. adobe, browsers, utilities

  • Scan endpoints to detect missing patches

24
New cards

True/False orgs only use one patching solutions

False