Risk Analysis Flashcards

(31 cards)

1
Q

describes where a threat originates and the path it takes to reach its target.

A

Threat Vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This process involves identifying potential incidents, identifying what is being protected, and determining who might exploit those weaknesses. It provides focus to a security strategy and helps avoid overlooking significant risks.

A

Threat Definition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TYPES OF ATTACKS

viruses, worms, Trojans

A

Malicious mobile code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TYPES OF ATTACKS

banner grabbing or packet sniffing

A

Manual Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TYPES OF ATTACKS

stealthy, targeted attacks often sponsored by hostile governments for political or financial gain.

A

Advanced Persistent Threats (APTs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This involves creating an inventory of items to protect and determining their value in terms of criticality to the business.

A

Asset Identification and Valuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ uses actual monetary values and formulas like Annualized Loss Expectancy (ALE), which multiplies the cost of a single loss (SLE) by the expected frequency of that event per year (ARO).

A

Quantitative ANalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ is often more practical for smaller environments, focusing on assigning severity levels (such as High, Medium, or Low) to threats and assets to guide prioritization.

A

Qualitative Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk analysis recognizes that attackers will focus on the easiest path of entry, meaning security must be equivalent or transitive across all systems—technical and non-technical—that have access to a specific asset.

A

Weakest Link Principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is a term used to describe where a threat originates and the path it takes to reach a target.

A

Threat Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SECURITY CONTROL CATEGORIES

blocking threats

A

Preventative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SECURITY CONTROL CATEGORIES

noticing attacks

A

detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SECURITY CONTROL CATEGORIES

discouraging violations

A

deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SECURITY CONTROL CATEGORIES

restoring integrity

A

corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SECURITY CONTROL CATEGORIES

restoring availability

A

recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SECURITY CONTROL CATEGORIES

backup layers

17
Q

SAMPLE THREATS VECTOR ELEMENTS

Lock

18
Q

SAMPLE THREATS VECTOR ELEMENTS

Firewalls

19
Q

SAMPLE THREATS VECTOR ELEMENTS

Guards on Station

20
Q

SAMPLE THREATS VECTOR ELEMENTS

Cameras

21
Q

SAMPLE THREATS VECTOR ELEMENTS

IDS, logging, SIEM

22
Q

SAMPLE THREATS VECTOR ELEMENTS

Guards Patrolling

23
Q

SAMPLE THREATS VECTOR ELEMENTS

Signs barbed wire

24
Q

SAMPLE THREATS VECTOR ELEMENTS

Security policies

25
SAMPLE THREATS VECTOR ELEMENTS Visible guards and cameras
Deterrent
26
SAMPLE THREATS VECTOR ELEMENTS Dynamic pop up warnings
Deterrent
27
SAMPLE THREATS VECTOR ELEMENTS HR Penalties
corrective
28
SAMPLE THREATS VECTOR ELEMENTS Redundancy
Corrective
29
SAMPLE THREATS VECTOR ELEMENTS backups, data replication
Recovery
30
SAMPLE THREATS VECTOR ELEMENTS Disaster recovery plans
Recovery
31
SAMPLE THREATS VECTOR ELEMENTS Manual Processes
Compensative