Risk Assessment and Management

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

flashcard set

Earn XP

Description and Tags

A collection of vocabulary flashcards focusing on key terms and concepts related to Risk Assessment and Incident Response in Cybersecurity.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

19 Terms

1
New cards

Risk Assessment

The process of identifying and evaluating risks in order to mitigate their effects.

2
New cards

Incident Response

A strategy for addressing security breaches or cyberattacks on an organization.

3
New cards

Threat Modeling

A structured approach to identifying and prioritizing potential security threats.

4
New cards

PASTA

Process for Attack Simulation and Threat Analysis, a method that links business objectives to technical threats.

5
New cards

ATASM

Architecture, Threats, Attack Surfaces, Mitigations; a high-level framework for threat modeling.

6
New cards

STRIDE

A threat modeling framework that categorizes threats into Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege.

7
New cards

DREAD

A risk rating system used to prioritize threats based on Damage potential, Reproducibility, Exploitability, Affected users, and Discoverability.

8
New cards

Event

An observable occurrence in a network or system.

9
New cards

Adverse Event

An event that has a negative consequence, potentially caused by various factors.

10
New cards

Incident

A violation or imminent threat of violation of computer security policies.

11
New cards

Risk

The measure of the likelihood of a threat exploiting a vulnerability with potential harmful effects.

12
New cards

Assets

Resources that need to be protected, including tangible and intangible elements of an organization.

13
New cards

Vulnerability

Exploitable flaws or weaknesses in IT systems or processes that can be targeted by threats.

14
New cards

Threat

A potential for violation of security that exists when a circumstance or event could cause harm.

15
New cards

Mitigation

Actions taken to reduce or eliminate risks associated with threats and vulnerabilities.

16
New cards

What are the typical phases of an Incident Response Lifecycle?

  1. Preparation 2. Detection and Analysis 3. Containment, Eradication, and Recovery 4. Post-Incident Activity (Lessons Learned)

17
New cards

Threat Actor

An individual, group, or entity that is responsible for a security incident or has the potential to cause harm to an organization's assets.

18
New cards

Security Control

A safeguard or countermeasure to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets.

19
New cards

Exploit

A piece of software, data, or sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something else usually computer-controlled.