A security design principle that states that every time a subject requests access to an object, the request needs to be checked to ensure that the subject has the authority to access the object.
Complete mediation
A security design principle that ensures that no single point of complete compromise exists by implementing multiple layers of risk mitigation controls. Also known as layered defense.
Defense-in-Depth
A security design principle that states that when the software is architected, the mechanisms that are common (shared) between two different users or processes must be minimized.
Least common mechanism
A security design principle that ensures that no one person or process can complete an operation in its entirety. It is also referred to as the compartmentalization principle.
Separation of duties
A willingness of users to accept a particular control.
Psychological acceptability
A security design principle that states that the likelihood of vulnerabilities increases with the complexity of the software design.
Economy of mechanism
A security design principle that ensures that the attack surface is not increased and no newer vulnerabilities are introduced because existing components of code/functionality are reused (leveraged) when architecting software.
Leveraging existing components
A security design principle that ensures that when the software fails, the confidentiality, integrity, and availability of the software is still maintained along with rapid recovery. Also known as Fail Secure.
Fail safe
A security design principle that states that the security of the software/system should not be a secret, but be open for review.
Open design
A security design principle in which a user or process is explicitly given only the necessary and minimum level of access rights (privileges) for a specified amount of time, in order to complete an operation.
Least privilege
Which of the following is an acceptable approach to risk treatment or response?
Accept risk
What is an advantage of economy of mechanism?
To avoid complexity in a system’s design
What does psychological acceptability refer to?
The problem that users will resist security they feel is unnecessary
What technique is used to restrict the amount of data in a customer record that is visible to a user of an application that accesses a database?
View-based controls
What is the primary purpose of Information System’s controls?
To support and protect the business mission
What is the primary benefit of enforcing least privilege?
To protect the integrity of data
What term is used to describe checking all access requests to ensure that only appropriate levels of access are granted?
Complete mediation
What risk is often associated with confidentiality?
Data breach liability
You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?
Qualitative risk analysis
Bill is the project manager of the JKH Project. He and the project team have identified a risk event in the project with a high probability of occurrence and the risk event has a high cost impact on the project. Bill discusses the risk event with Virginia, the primary project customer, and she decides that the requirements surrounding the risk event should be removed from the project. The removal of the requirements does affect the project scope, but it can release the project from the high risk exposure. What risk response has been enacted in this project?
Transference
You are the project manager for GHY Project and are working to create a risk response for a negative risk. You and the project team have identified the risk that the project may not complete on time, as required by the management, due to the creation of the user guide for the software you’re creating. You have elected to hire an external writer in order to satisfy the requirements and to alleviate the risk event. What type of risk response have you elected to use in this instance?
Transference
To help review or design security controls, they can be classified by several criteria . One of these criteria is based on their nature. According to this criterion, which of the following controls consists of incident response processes, management oversight, security awareness, and training?
Compliance control
Which of the following are the types of access controls? (Pick 3)
Administrative, Technical, Physical
You are the project manager for a construction project. The project involves casting of a column in a very narrow space. Because of lack of space, casting it is highly dangerous. High technical skill will be required for casting that column. You decide to hire a local expert team for casting that column. Which of the following types of risk response are you following?
Avoidance