Information Systems, Risk, Threat Landscape

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/140

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

141 Terms

1
New cards
What is cybersecurity?

The protection of information systems (hardware, software, and associated infrastructure), the data on them, and the services they provide from unauthorised access, harm, or misuse.

  • This includes harm caused intentionally by the operator of the system, or accidentally, as a result of failing to follow security procedures.

2
New cards
Who does cybersecurity protect?

Information systems, consisting of

  • People (operator)

  • Physical (infrastructure)

  • Technical (hardware, software)

  • Data, and services of the system

3
New cards
What are cybersecurity analytics used for?

To analyze cybersecurity problems.

4
New cards
What are the key considerations in cybersecurity?

The threat landscape (what to protect):

  • e.g., what’s happening around the world, which industry and what industry-specific attacks are there.

How do we design cybersecurity?

  • Incorporate within the system architecture.

How do we implement cybersecurity?

  • Physical (data center security access cards), electronic, administrative.

What are the risks, impacts, and controls?

  • e.g., implementing a data center, risk analysis before, impact of attacks, and control includes prevention and response.

5
New cards
Why do we need cybersecurity?
  • Business continuity:

  • Competitive advantage:

  • Reputation:

  • Return on investment:

  • Shareholder value:

  • Privacy:

  • Legal obligation:

  • Intellectual property (IP).

6
New cards
Why is business continuity important to protect with cybersecurity?
- Business continuity ensures that critical operations continue even during disruptions.- e.g., bank attacks cause all transactions to stop, greatly impacting the business if services stop (function).
7
New cards
Why is competitive advantage important to protect with cybersecurity?
- A competitive advantage is gained by protecting a company’s systems and data from cyber threats.- e.g., when comparing 2 banks to invest in, choose the one with fewer cyber attack incidents in its history.
8
New cards
Why is reputation important to protect with cybersecurity?
- Reputation is vital for maintaining public trust and brand value.- e.g., repeated cyberattacks on the Royal Bank of Scotland caused trust issues, making it hard to recover public relations.
9
New cards
Why is return on investment important to protect with cybersecurity?
- Protecting investments ensures that companies receive the returns they expect without financial loss due to cyber threats.- Cybersecurity helps safeguard investments by preventing damage from attacks.
10
New cards
Why is shareholder value important to protect with cybersecurity?
- Shareholder value is tied to the security of a company’s funds and operations.- If a company’s assets are insecure, it negatively affects shareholder dividends and company growth.
11
New cards
Why is privacy important to protect with cybersecurity?
- Privacy protects personal and sensitive data from unauthorized access.- Key regulations, like GDPR (Europe) and DPA (UK), enforce the protection of individual privacy.
12
New cards
Why is legal obligation important to protect with cybersecurity?
- Legal obligations ensure compliance with regulations and standards, protecting both businesses and consumers.- Following these regulations is necessary to gain certifications or approval for business operations.
13
New cards
Why is intellectual property (IP) important to protect with cybersecurity?
- Intellectual property (IP) includes valuable creations and innovations that need protection from theft or unauthorized use.- Cybersecurity is essential for safeguarding IP against cybercrime.
14
New cards
Why is supply chain integrity important to protect with cybersecurity?
- Protecting the supply chain ensures that the value and functionality of a product or service remain intact.- e.g., a compromised supply chain can reduce the value of a product or service if it's hacked or tampered with.
15
New cards
Why is cybersecurity important in today's world?

We are living in an increasingly digital world, with handheld devices, cars, and healthcare.

  • The more we have digitally, the more criminals have access to move around and attack us.

16
New cards
Why is information security important to a business?
  • It maintains business continuity and viability by ensuring its goals are achieved.

  • Protects assets by ensuring they aren’t impacted by realised threats.

  • Helps ensure they are following laws, regulations, and security policies.

17
New cards
How does information security differ between businesses?

Different organizations have different risk tolerances, so information security needs to be tailored to each business.

18
New cards
What does information security include?
  • Safeguard: planned security measures to protect assets.

  • Countermeasure: response actions to mitigate security risks and issues.

19
New cards
What types of controls can be implemented to ensure information security?
  • Administrative control: policy development and enforcement.

  • Technical control: preventing data loss, firewalls.

  • Physical control: CCTV, locks.

  • Cyber-physical security: consider both network and real-world implications.

    • Must understand business risk exposure and risk appetite when implementing controls.

20
New cards

what are the main principles / concepts of information security

  • CIA triad

  • authentication

  • authorization

  • non-repudiation

  • audit

21
New cards
Why is authentication important in information security?

Authentication verifies identity through methods like passwords, smart cards, biometric devices, and one-time passwords (OTPs).

22
New cards
Why is authorization important in information security?

Authorization determines access rights once identity is verified, such as server permissions and physical access control.

23
New cards
Why is non-repudiation important in information security?

Non-repudiation ensures that actions taken by users or systems are recorded and cannot be denied later, providing accountability.

24
New cards
Why is audit important in information security?

Auditing captures information that can be troubleshooted later, helping to monitor actions and trace security issues.

25
New cards
Why is accountability important in information security?

Accountability ensures that individuals are responsible for their actions, helping to enforce security protocols and avoid breaches.

26
New cards

what makes up the CIA traid

  • confidentiality

  • integrity

  • availability

27
New cards

what is the CIA triad

a model that describes the 3 goals of information security, and guides policy development within organisations - any cybersecurity attack can be classified under this model

28
New cards

what is confidentiality

preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information

29
New cards

what is integrity

guarding against improper information modification or destruction and ensuring information non-repudiation and authenticity

30
New cards

what is availability

ensuring timely and reliable access to and use of information

31
New cards
Why is the preservation of the CIA Triad important in information security?

ensures the core principles of protecting data and information systems.

  • It helps maintain trust, functionality, and security of the system.

32
New cards

what is the threat landscape

the overall picture of potential cyber threats and risks facing individuals, organizations, or systems

33
New cards
What are the core elements of risk in the threat landscape?
  • Stakeholders

  • Controls

  • Vulnerabilities

  • Risk

  • Threat Agents

  • Threats

  • Assets

34
New cards
What is the acronym to remember the elements of the threat landscape?

Silly Cats Visit Real Trees To Admire.

35
New cards
What can companies use to understand and mitigate threats in the threat landscape?

Companies can use frameworks to understand the threat landscape and mitigate threats.

36
New cards

what are stakeholders

Any person with a vested interest in the business who want to minimise risk including management or government

37
New cards

what are the links between stakeholders in the threat landscape

  • Stakeholders value [[Assets]]

  • Stakeholders want to minimise [[Risk]]

  • Stakeholders impose [[Controls]]

  • Stakeholders need to be awake of [[Vulnerabilities]]

38
New cards

what are controls

Any controls and policies implemented need to be anchored to [[CIA Triad]]

39
New cards

what are the links between controls and the threat landscape

  • Controls are used to mitigate [[Risk]]

  • Controls are used to mitigate [[Vulnerabilities]]

  • Controls are used to mitigate [[Threats]]

40
New cards

what are vulnerabilities

A weakness that leaves you exposed to a threat, can cause legal liabilities and software vendors need to protect themselves from their own liabilities

41
New cards

what are the links between vulnerabilities and the threat landscape

  • Vulnerabilities exist within [[Assets]]

  • Vulnerabilities increase the likelihood of [[Risk]]

42
New cards

what is risk

The possibility that a given threat will exploit a vulnerability to harm an asset or organisation

43
New cards

what is the link between risk and the threat landscape

  • Risk impacts [[Assets]]

44
New cards
What is risk management?

The process of understanding and responding to factors that may lead to a failure in the CIA Triad of an information system, to ensure the business’s longevity.

45
New cards
How can a business manage risk?

By following a Risk Management Framework.

46
New cards
What is the business impact of risk management?
  • Businesses need to align their risk management activities with their goals and objectives.

  • Need to build a bridge between business and technology risks, as businesses might not understand them.

  • Risk management language needs to be consistent across the business.

  • Use of resources to map potential vectors and vulnerabilities creates a better risk assessment.

47
New cards

what are threat agents

The individuals or entities who have the capability to exploit vulnerabilities and pose threats

48
New cards

what are the links between threat agents and the threat landscape

  • Threat agents want to abuse and cause harm to [[Assets]]

  • Threat ages give rise to [[Threats]]

49
New cards

what are threats

Natural or human induced event that could take advantage of a vulnerability to damage an asset e.g. floods that need planning to ensure business ops can continue, and viruses. Threats have the potential to harm.

50
New cards

what are the links between threats and the threat landscape

  • Threats exploit [[Vulnerabilities]]

  • Threats affect [[Assets]]

  • Threats increase the likelihood of [[Risk]]

51
New cards

what are assets

Anything of value that needs to be protected, can be a person or a system

52
New cards

what is risk tolerances

the amount of [[Risk]] that the organization can actually cope with per individual risk, and the acceptance of specific risk outcomes should they occur

53
New cards

what is risk appetite

the general type and amount of [[Risk]] that an organisation is willing to take in order to meet their strategic objectives without needing to take action to reduce the risk- variable depending on an organisation’s sector, culture, and objective

54
New cards
What different vulnerabilities are there in a system?
  • Technology weakness

  • Configuration weakness

  • Security policy weakness

55
New cards
What are technology weaknesses?
  • Protocol weaknesses which exist in the design of the protocol, making them very hard to change since protocols are dependent on each other.

    • Examples: TCP/IP protocol, HTTP, FTP, ICMP, ARP.

  • Software vulnerabilities (see SSDF for reference):

  • Common deficiencies in the software code itself,

    • e.g., buffer overflow as a result of poor memory management.

56
New cards
What are configuration weaknesses?
  • The system/software is not set up properly, creating more weaknesses, e.g.

    • Weak or default passwords.

    • Misconfigured firewall.

    • Leaving ports open.

57
New cards
What are security policy weaknesses?
  • Weak security policy or policy enforcement/implementation.

  • Software and hardware installations and changes not following policy.

  • Lack of 2-factor authentication.

58
New cards
How are vulnerabilities specified after a security researcher identifies them?

Using the CVE framework:

  • Notify the vendor of the software/protocol/device so they can fix it.

  • Assign the vulnerability to a unique CVE identifier.

  • Patches refer to the CVE, and once the fix has been made (not before), the vulnerability is announced (e.g., Sims 4 patch notes).

59
New cards

what are CVEs

Common Vulnerabilities and Exposure system

  • acts as a reference dictionary of publicly known information security [[Vulnerabilities]] and exposures

60
New cards
What is a risk management framework?

A set of guidelines and processes used by companies to identify, eliminate, and minimise risk.

61
New cards
What are the 6 key components of the ISO 27005 risk management framework?
  1. Context Establishment

  2. Risk Assessment

  3. Risk Treatment

  4. Risk Acceptance

  5. Risk Communication and Consultation

  6. Risk Monitoring and Review

62
New cards
Why are good risk management programs important?

They help organisations weather negative realised risks and capitalise on positive realised risks.

63
New cards
What should an organisation aim to do with the effects of risk?

Minimise negative effects and maximise positive effects.

64
New cards
What is a security gap?

The difference between the security controls in place and the controls necessary to address all vulnerabilities.

65
New cards
How can a security gap be identified?

Through a gap analysis.

66
New cards

what is context establishment

sets criteria for how risks are identified, risk ownership, how risks impact [[CIA]], and how risk impact and likelihood will be calculated

67
New cards

what is risk assessment

the actions from risk identification to prioritisation, frames how we implement the controls

68
New cards

what are the stages in the risk assessment process

  1. risk identification

  2. risk analysis

  3. risk evaluation

69
New cards
What are the aims of risk identification?

To identify assets, threats, existing controls, vulnerabilities, and potential impacts.

70
New cards
Why is the identification of assets important during risk identification?

Because when a threat is realised, the most important assets need to be restored first.

71
New cards
Why is the identification of threats important during risk identification?

Because different threats impact different areas, e.g., infrastructure threats vs. pandemic threats affecting personnel and business operations.

72
New cards
Why is the identification of existing controls important during risk identification?

It helps assess what protections are already in place and where gaps may exist.

73
New cards
Why is the identification of vulnerabilities important during risk identification?

To understand weaknesses in the system that could be exploited by threats.

74
New cards
Why is the identification of impact important during risk identification?

It ensures planning for both widespread disasters and specific scenario impacts, often included in a Disaster Recovery Plan.

75
New cards
What is the output of risk identification?

A risk register

  • a list of all identified risks with detailed information about each.

76
New cards
Why is risk identification important?

Because organisations can’t prepare for potential risks they aren’t aware of.

77
New cards

what are the aims of risk analysis

assessment of impact, likelihood, and level of risk determination

78
New cards

what methodologies can be used during the risk analysis stage

  • Quantitative Risk Methodology

  • Qualitative Risk Methodology

79
New cards
What is a quantitative risk methodology?
  • It uses numerically based (hard), objective data to measure risk.

  • It measures monetary units like expenses and return on security investments.

  • It relies on experts estimating risk in financial terms.

80
New cards

what calculations are done in the quantitative risk methodology

  • Asset Value

  • Exposure Frequency

  • Single Loss Expectancy

  • Annual Rate of Occurrence

  • Annualised Loss Expectancy

<ul><li><p>Asset Value</p></li><li><p>Exposure Frequency</p></li><li><p>Single Loss Expectancy</p></li><li><p>Annual Rate of Occurrence</p></li><li><p>Annualised Loss Expectancy</p></li></ul><p></p>
81
New cards
What is Asset Value (AV)?

The value of the asset.

82
New cards
What is Exposure Frequency (EF)?

How often a threat may occur.

83
New cards
What is Single Loss Expectancy (SLE)?

The financial loss if a threat is realised once.

84
New cards
What is Annual Rate of Occurrence (ARO)?

The number of incidents expected per year.

85
New cards
What is Annualised Loss Expectancy (ALE)?

The maximum amount worth spending to protect assets.

86
New cards
How do you calculate Single Loss Expectancy (SLE)?

SLE = AV x EF

<p>SLE = AV x EF</p>
87
New cards
How do you calculate Annualised Loss Expectancy (ALE)?

ALE = SLE x ARO

<p>ALE = SLE x ARO</p>
88
New cards
How do we calculate the value of a security control?

Value = ALE before control - ALE after control - annual maintenance cost of the control

89
New cards
How does calculating the value of a security control help decision-making?

If the value is positive, it’s financially worthwhile to implement the control.

90
New cards

what is a qualitative risk methodology

  • uses scenario-based (soft), subjective data

  • gradual scale

  • based on risk perceptions by stakeholders

91
New cards

how does the qualitative risk methodology work

make use of risk scenarios - from a risk register, and risk scale, e.g. likelihood vs. impact, to describe the magnitude of impact and compare and prioritise the risks to see which needs dealing with first

92
New cards

what is risk evaluation

the evaluation of risk based on risk evaluation criteria like predetermined levels of acceptability. also deals with prioritising which risks need to be addressed (result of quantitative) and in which order (result of qualitative)

93
New cards

what is risk treatment

how the organisation responds to the identified risk (and as a result risk)

94
New cards
What are the two classes of risk that need to be identified during the risk management process?
  • Inherent risk

  • Residual risk

95
New cards
What is inherent risk?

The total currently existing risk, calculated as:

  • threats × vulnerabilities × asset value

96
New cards
What is residual risk?

The risk that remains after controls have been applied;

  • inherent risk - the cumulative effect of controls

97
New cards
Why is residual risk important?

Because it's impossible to eliminate all risk, so controls are used to reduce inherent risk to an acceptable residual level.

98
New cards
What are the different risk treatment options?
  • Risk mitigation

  • Risk acceptance

  • Risk avoidance

  • Risk transfer

<ul><li><p>Risk mitigation</p></li><li><p>Risk acceptance</p></li><li><p>Risk avoidance</p></li><li><p>Risk transfer</p></li></ul><p></p>
99
New cards
What is risk mitigation?

Actions taken to modify and reduce risk, typically through the application of administrative, technical, or physical controls.

100
New cards

What is risk acceptance? (as a risk treatment plan)

Accepting the risk as is, based on whether it falls within the established risk acceptance criteria determined by analysis.