Definitions Flashcards

(24 cards)

1
Q

What is risk in information security?

A

The potential for loss or damage when a threat exploits a vulnerability, affecting the confidentiality, integrity, or availability of assets.
Formula: Risk = Likelihood × Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does likelihood represent in risk analysis?

A

The probability or frequency that a threat will successfully exploit a vulnerability — how probable an incident is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does impact mean in information security?

A

The magnitude of adverse consequences when a threat materializes — how severe the effect is on confidentiality, integrity, or availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define vulnerability in cybersecurity.

A

A weakness or flaw in systems, processes, or controls that could be exploited by a threat.
Examples: unpatched software, misconfigured systems, weak authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a threat?

A

A potential cause of an unwanted incident that may exploit a vulnerability — e.g., hackers, malware, insider misuse, or natural disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the CIA triad represent?

A

The three pillars of information security:

Confidentiality — only authorized access

Integrity — accuracy and completeness

Availability — timely and reliable access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is confidentiality ensured?

A

By protecting data from unauthorized access or disclosure through controls such as encryption, access management, and non-disclosure policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is integrity in information security?

A

Assurance that data is accurate, consistent, and unaltered except by authorized processes.
Controls: checksums, version control, digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does availability protect against?

A

Disruptions that prevent authorized users from timely access — e.g., downtime, denial-of-service attacks, or hardware failures.
Controls: redundancy, backups, failover systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does systematization of security mean?

A

The structured, repeatable, organization-wide management of security using formal processes, policies, risk assessments, and continuous improvement.
→ Usually implemented through an ISMS (ISO 27001).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens during context establishment?

A

Define internal/external context, business objectives, stakeholders, and regulatory environment to align risk management with organizational goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s the goal of risk identification?

A

Determine what could go wrong — list threats, vulnerabilities, and affected assets to create a comprehensive risk inventory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does risk analysis involve?

A

Assessing likelihood and impact for each identified risk using qualitative or quantitative methods to estimate overall risk levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of risk evaluation?

A

Compare analyzed risks against risk criteria or tolerance levels to determine acceptability and prioritize treatment efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the four main risk treatment strategies?

A

Avoid — eliminate activity/source of risk.

Reduce — implement controls to lower risk.

Transfer — outsource or insure risk.

Accept — tolerate risk within set thresholds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the full sequence of the risk life cycle?

A

Context → Identification → Analysis → Evaluation → Treatment → Monitoring & Review (continuous loop).

17
Q

What does the Capability Maturity Model measure?

A

The maturity and optimization of an organization’s processes — including how consistent, measurable, and continuously improved they are.

18
Q

What characterizes CMM Level 1 (Initial)?

A

Processes are ad hoc and unpredictable; outcomes depend on individual effort rather than structure.

19
Q

What happens at CMM Level 2 (Repeatable)?

A

Basic processes exist and can be repeated, but lack full documentation or standardization across teams.

20
Q

What defines CMM Level 3 (Defined)?

A

Processes are documented, standardized, and integrated across the organization — clear policies and procedures are in place.

21
Q

What is key about CMM Level 4 (Managed)?

A

Processes are measured and controlled quantitatively, enabling data-driven performance management.

22
Q

What distinguishes CMM Level 5 (Optimizing)?

A

Focus on continuous improvement — feedback, innovation, and proactive refinement of security processes.

23
Q

How does CMM maturity relate to ISMS effectiveness?

A

As maturity increases, security becomes proactive and predictive, not reactive — ensuring alignment with ISO 27001’s continual improvement philosophy.

24
Q

How are risk management and CMM maturity connected?

A

Mature organizations systematically assess, treat, and monitor risk, embedding feedback loops for learning and process optimization.