ITEC 3500: Midterm Review Flashcards – IT Risk Management

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/113

flashcard set

Earn XP

Description and Tags

A comprehensive set of flashcards covering key concepts from ITEC 3500: Information Technology Risk Management. These cards include essential topics such as Risk & Compliance, Information Security, IT Governance, and the Enterprise Risk Management (ERM) Framework. Designed for efficient study and active recall, these cards will help reinforce your understanding of the material and prepare you for the midterm exam.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

114 Terms

1
New cards

ERM

Enterprise Risk Management involves identifying potential events affecting an entity and managing risks within its risk appetite.

2
New cards

Risk Appetite

The level of risk an organization is willing to accept in pursuit of its business objectives.

3
New cards

Risk Universe

A comprehensive list of all possible risks that could impact an organization's objectives.

4
New cards

KRI

Key Risk Indicators are metrics signaling increasing risk exposures in various areas of an enterprise.

5
New cards

ALE

Annual Loss Expectancy is the expected loss per year calculated as Single Loss Expectancy * Annualized Rate of Occurrence.

6
New cards

SLE

Single Loss Expectancy is the potential loss amount for a single event impacting a company.

7
New cards

ARO

Annualized Rate of Occurrence represents the estimated frequency of a specific threat happening within a year.

8
New cards

Leading Indicators

Proactive metrics identifying emerging trends for risks to enable preventive actions.

9
New cards

Lagging Indicators

Reactive metrics providing information about past events and their impacts.

10
New cards

Three Lines of Defense

A risk governance model involving Risk Owners, Risk Oversight, and Risk Assurance to manage risks effectively.

11
New cards

Risk Owners

First line of defense responsible for managing risks within their respective business areas.

12
New cards

Risk Oversight

Second line of defense providing oversight and guidance on risk management across the organization.

13
New cards

Risk Assurance

Third line of defense ensuring the effectiveness of risk management processes and controls.

14
New cards

IT Risk

Potential events related to IT systems that could have adverse effects on business operations.

15
New cards

Risk Management Framework

A structured approach to identify, assess, and mitigate risks in alignment with organizational objectives.

16
New cards

Risk Language

Common terminology used to communicate and assess risks consistently across an organization.

17
New cards

Risk Reporting

The process of documenting and communicating information about risks to relevant stakeholders.

18
New cards

Risk Mitigation

Actions taken to reduce the likelihood or impact of identified risks.

19
New cards

Risk Assessment

The process of evaluating potential risks to determine their likelihood and impact on business objectives.

20
New cards

Risk Governance

The structure and processes through which an organization manages risks effectively.

21
New cards

Risk Framework

A set of tools, practices, and guidelines for managing risks consistently within an organization.

22
New cards

Risk Culture

The values, beliefs, and behaviors related to risk within an organization.

23
New cards

Risk Strategy

A plan outlining how an organization intends to manage and respond to risks to achieve its objectives.

24
New cards

Risk Monitoring

The ongoing process of tracking and evaluating risks to ensure they are within acceptable levels.

25
New cards

Risk Response

The actions taken to address identified risks, including acceptance, avoidance, mitigation, or transfer.

26
New cards

Risk Register

A documented list of identified risks, their likelihood, impact, and planned responses.

27
New cards

Risk Tolerance

The level of risk that an organization is willing to accept or retain.

28
New cards

Risk IT Principles

  1. Connect to Business Objectives

  2. Align IT Risk Management With ERM

  3. Balance Cost/Benefit of IT Risk

  4. Promote Fair and open Communication

  5. Establish Tone at the Top and Accountability

  6. Function as Part of Daily Activities

29
New cards

IT Risk Management (ITRM)

  1. Risk & Compliance: Responding & Managing Regulatory Requirements

  2. Infromation Security: Managing & Mitigating External & Internal Security Threats

  3. IT Governance: Aligning IT Delivery with Business Requirements

  4. Service Assurance: Enabling Operational Effectiveness & Efficiency

30
New cards

Options to respond to an identified risk

1. Remediate or mitigate the risk
2. Avoid the risk
3. Transfer the risk
4. Accept the risk

31
New cards

Key considerations when selecting an option

A) Cost vs. benefits
B) Only business owners can accept risk
C) Rare to eliminate risk entirely

32
New cards

Risk appetite

Enterprise-level statement defining risk tolerance based on expertise and alignment with business objectives

33
New cards

Risk tolerance

Tolerable deviation from risk appetite level, requiring case-by-case approval

34
New cards

Inherent risk

Risk level without considering management actions

35
New cards

Controls

Technical, administrative, or physical measures to mitigate risks

36
New cards

Control effectiveness

Assessed as highly effective, somewhat effective, or not effective

37
New cards

Residual risk

Remaining risk after risk response implementation, aiming to reduce to an acceptable level

38
New cards

Business Continuity Planning (BCP)

Ensuring business functionality in adverse situations like disasters

39
New cards

Disaster Recovery (DR)

Focused on recovering IT systems to maintain business operations

40
New cards

Business Impact Analysis (BIA)

Examination of business processes to understand recovery objectives

41
New cards

Recovery Time Objective (RTO)

Earliest time to restore a business process after a disaster to avoid consequences

42
New cards

Recovery Point Objective (RPO)

Acceptable data loss measured in time, determining backup frequency

43
New cards

Maximum Tolerable Downtime (MTD)

Total time a business process can be disrupted without causing unacceptable consequences

44
New cards

Full backup

Complete copy of entire data set, time-consuming but simplifies recovery

45
New cards

Incremental backup

Backup method that only backs up data that has changed since the last full or incremental backup.

46
New cards

Differential backup

Backup method that includes all data changed since the last full backup.

47
New cards

Hot site

Recovery site with all necessary equipment and IT systems ready for quick deployment.

48
New cards

Warm site

Recovery site partially equipped with basic resources, requiring longer setup time than a hot site.

49
New cards

Cold site

Basic recovery site with minimal equipment, suitable for low-cost recovery solutions.

50
New cards

Hash function

Function that converts input passwords into fixed-size hashes for security purposes.

51
New cards

Salting

Process of adding random values to hashed output to enhance security, particularly against rainbow table attacks.

52
New cards

Symmetric encryption

Encryption method using a single secret key for both encryption and decryption processes.

53
New cards

Asymmetric encryption

Encryption method using a pair of public and private keys for secure communication.

54
New cards

Digital signature

Electronic validation method ensuring the integrity and authenticity of a message.

55
New cards

Objective of Information Security

The goal of ensuring that data is kept safe and secure from unauthorized access or alterations.

56
New cards

Confidentiality

The security objective focused on ensuring that data is not accessed by unauthorized individuals, including encryption, data loss prevention, and access controls.

57
New cards

Availability

The security objective ensuring that data and systems are accessible and usable when needed, involving redundancy, backup, and fail-over measures.

58
New cards

Integrity

The security objective focused on maintaining the accuracy and reliability of data, involving measures like hashing, digital signing, and access control.

59
New cards

Preventive control

Controls designed to stop security incidents from occurring, such as secure entrances and granting read-only access.

60
New cards

Detective control

Controls aimed at identifying security incidents or patterns as they occur, like alarming systems and network scanning.

61
New cards

Corrective control

Controls implemented to fix issues after a security incident has taken place, such as using backup tapes to restore data.

62
New cards

Defense in depth

The principle of having multiple layers of security defenses so that if one layer is breached, others can still provide protection.

63
New cards

Segregation of duties

The practice of separating tasks to reduce the risk of fraud or errors, ensuring that no single individual has control over all aspects of a process.

64
New cards

Minimum privilege

The concept of granting individuals the least amount of access and permissions necessary to perform their job functions.

65
New cards

Need to know

The principle that restricts information access to only those who require it for their specific roles and responsibilities.

66
New cards

Data Owner

The individual responsible for the 'due care' of data, defining data classification and being accountable for associated risks.

67
New cards

Data Custodian

Responsible for the day-to-day maintenance and protection of data, ensuring security controls are in place.

68
New cards

System Owner

The individual ultimately responsible for a system, making decisions on access, risks, and system usage.

69
New cards

System Custodian

Responsible for the maintenance and operation of a system, implementing security controls and ensuring data protection.

70
New cards

Technical vulnerability

Weaknesses within systems or processes that can be exploited by threat actors, leading to security breaches.

71
New cards

Non-technical vulnerability

Weaknesses related to human behavior or processes that can be exploited by threat actors, posing security risks.

72
New cards

System Vulnerability

A web application bug may enable Internet-based attackers to access sensitive data using SQL injection.

73
New cards

Human Vulnerability

An employee who lacks security training might click a phishing email and thus pose a security risk to the organization.

74
New cards

Process Vulnerability

A company’s HR has built a hiring process which does not require background checking for the selected candidates.

75
New cards

CVE

Dictionary for publicly disclosed cyber vulnerabilities

76
New cards

CVSS

Rating standard for technical vulnerabilities that measures severity rather than risk.

77
New cards

Microsoft Patch Tuesday

Monthly release of Microsoft security patches

78
New cards

Remote Code Execution

Highest CVSS score vulnerability affecting Windows

79
New cards

Most Effective way of Addressing Technical vulnerabilities

Implementing security patches in a timely manner.

80
New cards

Zero Day Vulnerability

Publicly known vulnerability without a patch

81
New cards

Security Patching Challenges

  1. Many vendors do not follow a pre-determined schedule to release security patches. Some patches may not be captured by IT security in a timely manner.

  2. Implementing security patches is a disruptive process for business and can be very costly

82
New cards

Proactive Approach for Dealing with TV

Closely monitoring the vendor releases and/or announcements. Whenever critical vulnerabilities are made public by vendors (or other trustable sources), kick off the patch management procedure immediately.

83
New cards

Reactive Approach for Dealing with TV

Conduct vulnerability scans on all IT systems and applications on a regular basis (e.g., monthly, quarterly, etc.). Then address the findings with a risk-based approach, i.e., vulnerabilities with higher level of severity need to be addressed more quickly.

84
New cards

Compensating Control

Alternate protection when original control is impractical

85
New cards

Vulnerability Scans

Regular checks for IT system weaknesses

86
New cards

Root Cause Fix

Addressing the main source of a security flaw

87
New cards

Risk Analysis

Examining situation and documenting risk factors

88
New cards

Compensating Control Example

Retaining Win 7 machines with restricted access

89
New cards

Key Risk Indicators

Metrics to monitor phishing email risk levels

90
New cards

Identification

The process of establishing and centrally managing the identity of an individual, such as providing identification information like SIN or driver's license.

91
New cards

Authentication

The process of verifying that an individual is who they claim to be, typically through credentials like a user ID and password or a smart card.

92
New cards

Authorization

The process of mapping individual users to the resources they are allowed to access, determining what resources an identified user can access.

93
New cards

Two-factor authentication

A security process that requires two different authentication methods for access, such as a user ID/password and a physical token showing one-time passwords.

94
New cards

Active Directory (AD)

A directory service in a Windows environment managed by the Domain Controller, used to determine user access to network resources through Group Policy settings.

95
New cards

Accountability

Maintaining audit logs and ensuring non-repudiation, allowing tracking of user actions and preventing denial of performed actions in security incidents.

96
New cards

Biometric systems

Security systems that use unique physical or behavioral characteristics of individuals for authentication, such as palm scans, hand geometry, retina scans, and iris scans.

97
New cards

Type I Error

An error in a biometric system where an authorized user is rejected, also known as the false rejection rate (FRR).

98
New cards

Type II Error

An error in a biometric system where an unauthorized user is accepted, also known as the false acceptance rate (FAR).

99
New cards

Crossover Error Rate (CER)

A rating in biometric systems where Type I Errors equal Type II Errors, indicating the sensitivity threshold adjustment for accuracy.

100
New cards

Iris Scan

A biometric method capturing the colored portion of the eye surrounding the pupil, known for its high accuracy in identification.