Comptia Security + - Risk Management

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/88

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

89 Terms

1
New cards

Standard Operating Procedures (SOPs)

specific sets of written instructions about how to perform a certain aspect of a task

2
New cards

Interoperability Agreements

Legal Documents that need to be put in place before you engage services or interact with 3rd parties

3
New cards

Service Level Agreement (SLA)

formal contract between customers and their service providers that defines the specific responsibilities of the service provider and the level of service expected by the customer

4
New cards

Business Partners Agreement (BPA)

An agreement between partners in a business that outlines their responsibilities, obligations, and sharing of profits and losses.

5
New cards

Interconnection Security Agreement (ISA)

An agreement between parties to establish procedures for mutual cooperation and coordination between them with respect to security requirements associated with their joint project.

6
New cards

Memorandum of Understanding (MOU)

An agreement between two or more parties to enable them to work together that is not legally enforceable but is more formal than an unwritten agreement.

7
New cards

Memorandum of Agreement (MOA)

General areas of conditional agreement between two or more parties

Documents the exchange of services

8
New cards

Business Policies

statements of purpose that will define the way a business goes about achieving its goals. A successful set of policies set limits to business activity and encourage initiative.

9
New cards

Separation of Duties

The practice of requiring that processes should be divided between two or more individuals.

10
New cards

Clean Desk Policy

An organizational policy that specifies employees must inspect their work areas and ensure that all classified information, documents, and materials are secured at the end of every work day.

11
New cards

Background Checks

procedures used to verify the truthfulness and accuracy of information that applicants provide about themselves and to uncover negative, job-related background information not provided by applicants

12
New cards

Adverse Action

an action taken against an applicant, such as turning the applicant down for the job

13
New cards

Non-Disclosure Agreement (NDA)

a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes but wish to restrict access to or by third parties

14
New cards

Acceptable Use Policy (AUP)

Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet

15
New cards

Exit Interview

A meeting of a departing employee with the employee's supervisor and/or a human resource specialist to discuss the employee's reasons for leaving.

16
New cards

Data Owner

The individual(s), normally a manager or director, who has responsibility for the integrity, accurate reporting and use of computerized data

17
New cards

System Administrator

a person in charge of managing and maintaining a computer system of telecommunication system (as for a business or institution)

18
New cards

System Owner

Person or organization having responsibility for the development, procurement, integration, modification, operation and maintenance, and/or final disposition of an information system.

19
New cards

User

Application user that has the least privileged access to the application and data

20
New cards

Privileged User

A user who has special security and access to a system, such as the right to assign passwords

21
New cards

Executive User

A user who is responsible for the overall operation of the application and makes high leveled decisions in accordance with goals and future directions of the companu

22
New cards

Social Media Policies

Employees who use social media in a way that violates their employer's stated policies may be disciplined or fired from their jobs.

23
New cards

Mean Time To Restore (MTTR)

The average time needed to reestablish services to their former state.

24
New cards

Mean Time To Failure (MTTF)

The average amount of time a device is expected to operate before encountering a failure.

25
New cards

Mean Time Between Failures (MTBF)

A statistical value that is the average time until a component fails, cannot be repaired, and must be replaced.

26
New cards

Recovery Time Objective (RTO)

the maximum tolerable time to restore an organization's information system following a disaster, representing the length of time that the organization is willing to attempt to function without its information system

27
New cards

Recovery Point Objective (RPO)

the amount of data the organization is willing to reenter or potentially lose

28
New cards

Mission-Essential Functions

Operations that are core to the success of the business

29
New cards

Impact Analysis

The assessment of change to the layers of development documentation, test documentation and components, in order to implement a given change to specified requirements.

30
New cards

Privacy Threshold Analysis

An analysis that determines and identifies if any business processes are privacy sensitive and thus determines if a privacy impact assessment is required

31
New cards

Privacy Impact Assessment (PIA)

An assessment that determines the impact on the privacy of the individuals whose data is being stored, and ensures that the organization has sufficient security controls applied to be within compliance of applicable laws or standards.

32
New cards

Annualized Rate of Occurrence (ARO)

An estimate of how often a threat will be successful in exploiting a vulnerability over the period of a year.

33
New cards

Single Loss Expectancy (SLE)

The expected monetary loss every time a risk occurs.

34
New cards

Annual Loss Expectancy (ALE)

A calculation used to identify risks and calculate the expected loss each year.

ALO x SLE

35
New cards

Risk Register

A document in which the results of risk analysis and risk response planning are recorded.

36
New cards

Supply Chain Assessment

An assessment of the processes by which organizations receive necessary goods and services from third parties.

37
New cards

Quantitative Risk Analysis

A complex analysis technique that uses a mathematical approach to numerically analyze the probability and impact of risk events.

38
New cards

Qualitative Risk Analysis

An examination and prioritization of the risks based on their probability of occurring and the impact on the project if they do occur. Qualitative risk analysis guides the risk reaction process.

39
New cards

Quantitative Risk Assessment

An assessment that measures risk by using exact monetary values.

40
New cards

Qualitative Risk Assessment

An assessment that assigns numeric values to the probability of a risk and the impact it can have on the system or network.

41
New cards

Business Impact Analysis (BIA)

An analysis of the most important mission-critical business functions, which identifies and quantifies the impact such a loss of the functions may have on the organization in terms of its operational and financial position.

42
New cards

Risk-Avoidance

A risk response strategy whereby the project team acts to eliminate the threat or protect the project from its impact.

43
New cards

Transference

A risk response strategy whereby the company purchases insurance from a 3rd party vendor as a means to mitigate any risk to the whole company

44
New cards

Acceptance

A risk response strategy where you accept all risk as a business decision

45
New cards

Mitigation

the action of reducing the severity, seriousness, or impact of a vulnerability on a system

46
New cards

Change Management Process

the sequence of steps that a manager would follow for the successful implementation and adoption of change

47
New cards

Security Incident

A specific instance of a risk event occurring, whether or not it causes damage.

48
New cards

Incident Categories

1. External/Removable Media

- attack used removable media

2. Attrition

- A brute-force attack

3. Web

- Attack executed from a web site or web-based application

4. Email

- Attack executed from an email message or attachment

5. Improper Usage

- Attack resulted from a violation of the Acceptable Use Policy

6. Loss or theft of equipment

7. Other

49
New cards

Incident Response Team

The team that manages and executes the IR plan by detecting, evaluating, and responding to incidents.

50
New cards

Incident Notification

Contact List of people whom you will reach out to based on a specific incident

51
New cards

Cyber-Incident Response Team

A group responsible for receiving, reviewing, and responding to security incidents.

52
New cards

Order of Volatility

The sequence of volatile data that must be preserved in a computer forensic investigation

53
New cards

Chain of Custody

a written record of all people who have had possession of an item of evidence

54
New cards

Legal Hold

A court order to preserve data for the purposes of an investigation. Upon receipt of a legal hold notification, a company is required to activate a defensible policy for the preservation of the data.

55
New cards

Capture System Image

Having an exact duplicate of the contents of a disk by using software imaging tools

56
New cards

Traffic Logs

Reports produced from software on your web server or provided by the company hosting your web site that tell you the domain of your visitors and their referring pages

57
New cards

Capture Video

Using a video camera to clearly document the entire process of a forensics investigation

58
New cards

Recording Time Offsets

Recording and knowing the time zone differences of the operating system

59
New cards

Take Hashes

Taken prior to imaging. Taken again on the resultant image file to confirm they are both identical.

MD5, SHA1, SHA256, or SHA512.

If one letter in an entire dictionary is changed, the hash would be different.

60
New cards

Cyclical Redundancy Check (CRC)

A method to ensure data has not been altered after being sent through a communication channel

61
New cards

Strategic Intelligence

information about the changing nature of certain problems and threats for the purpose of developing response strategies and reallocating resources

62
New cards

Cold Site

A separate facility that does not have any computer equipment, but is a place where employees can move after a disaster

63
New cards

Warm Site

A remote site that contains computer equipment but does not have active Internet or telecommunication facilities, and does not have backups of data.

64
New cards

Hot Site

A separate and fully equipped facility where the company can move immediately after a disaster and resume business

65
New cards

Order of Restoration

The sequence in which different systems are reinstated or have a higher priority of recovery

66
New cards

Archive Attribute

Attribute of a file that shows whether the file has been backed up since the last change. Each time a file is opened, changed, or saved, the archive bit is turned on. Some types of backups turn off this archive bit to indicate that a good backup of the file exists on tape.

67
New cards

Full Backup

a backup that copies all data to the archive medium

68
New cards

Incremental Backup

Backup that copies only the changed data since the last backup

69
New cards

Differential Backup

A type of partial backup that involves copying all changes made since the last full backup. Thus, each new differential backup file contains the cumulative effects of all activity since the last full backup.

70
New cards

Off-site Backup

an additional copy of the backup files stored in an off-site location either physically or electronically

71
New cards

Data Sovereignty

A term that refers to the legal implications of data stored in different countries. It is primarily a concern related to backups stored in alternate locations via the cloud.

72
New cards

Tabletop Exercise

Exercises that simulate an emergency situation but in an informal and stress-free environment

73
New cards

After-Action Report

retrospective analysis used to evaluate emergency response drills

74
New cards

Failover

a specific type of fault tolerance, occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to the secondary server or backup server

75
New cards

Technical Control Types

Using systems and software inside of infrastructure to be able to limit the impact or prevent a security event

76
New cards

Administrative Control Types

controls that determine how people act such as Security Policies and Standard Operating Procedures

77
New cards

Physical Control Types

controls that physically separate people from the systems

78
New cards

Deterrent security control

Used to dissuade or deter attacks

79
New cards

Preventive security control

controls that take preventive measure in ensuring events or incidents do not occur

80
New cards

Detective Security Control

Used to monitor and/or send alerts about activity

81
New cards

Compensating Security Controls

controls that allow you to restore systems back to operational status

82
New cards

Corrective security controls

controls that are designed to mitigate damage done to a system

83
New cards

Personally Identifiable Information (PII)

any data that can be used to identify, locate, or contact an individual

84
New cards

Protected Health Information (PHI)

Individually identifiable health information that is transmitted or maintained by electronic media.

85
New cards

Data Steward

responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business

86
New cards

Data Custodian

responsible for storage, maintenance, and protection of information

87
New cards

Privacy Officer

a person designated to ensure compliance with privacy standards for a covered entity

88
New cards

Data Retention

Refers to the policies that govern data and records management for meeting internal, legal and regulatory data archival requirements.

89
New cards

Archive Bit

a bit used to determine whether or not a file has been altered