Security & Risk Management Flashcards

1
Q

Accountable for ensuring the protection of all of the business information assets from intentional & unintentional loss, disclosure, alteration, destruction, & unavailability

A

Information Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authorizes the President to designate those items that shall be considered as defense articles & defense services & control their import & the export

A

Arms Export Control Act of 1976

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ensures the business focuses on core activities, clarifies who in the organization has the authority to make decisions, determines accountability for actions & responsibility for outcomes, & addresses how expected performance will be evaluated

A

Governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is similar to due care with the exception that it is a preemptive measure made to avoid harm to other persons or their property

A

Due Diligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The care a “reasonable person” would exercise under given circumstances

A

Due Care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Controls designed to discourage people from violating security directives.

A

Deterrent Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Controls designed to signal a warning when a security control has been breached.

A

Detective Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Electronic hardware & software solutions implemented to control access to information & information networks

A

Logical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The practice of coming up with alternatives so that the risk in question is not realized.

A

Risk Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The practice of accepting certain risk typically based on a business decision that may also weigh the cost versus the benefit of dealing with the risk in another way

A

Risk Acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Combination of the probability of an event & its consequences.
  2. An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result. (RFC 2828)
A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The point in time to which data must be restored in order to successfully resume processing

A

Recovery Point Objective (RPO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How quickly you need to have that application’s information available after downtime has occurred

A

Recovery Time Objective (RTO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Controls implemented to prevent a security incident or information breach

A

Preventative Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Controls to protect the organization’s people & physical environment, such as locks, fire management, gates, & guards; physical controls may be called “operational controls” in some contexts

A

Physical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Protects, novel, useful, & non-obvious inventions

A

Patent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Granting users only the accesses that are required to perform their job functions

A

Least Privilege

18
Q

Comes in 2 forms; making sure information is processed correctly & not modified by unauthorized persons, & protecting information as it transits

A

Integrity

19
Q

Covers the expression of ideas rather than the ideas themselves; it usually protects artistic property such as writing, recordings, databases, & computer programs

A

Copyright

20
Q

An estimate of how often a threat will be successful in exploiting a vulnerability over the period of a year

A

Annualized Rate of Occurrence (ARO)

21
Q

Procedures implemented to define the roles, responsibilities, policies, & administrative functions needed to manage the control environment

A

Administrative Controls

22
Q

Defined as the difference between the original value & the remaining value of an asset after a single exploit

A

Single Loss Expectancy (SLE)

23
Q

The principle that ensures that information is available & accessible to users when needed

A

Availability

24
Q

An incident that results in the disclosure or potential exposure of data

A

Breach

25
Q

The practice of the elimination of or the significant decrease in the level of risk presented

A

Risk Mitigation

26
Q

Established to contribute to regional & international security & stability by promoting transparency & greater responsibility in transfers of conventional arms & dual-use goods & technologies, thus preventing destabilizing accumulations

A

Wassenar Arrangement

27
Q

Determines the potential impact of disruptive events on the organization’s business processes

A

Vulnerability Assessment

28
Q

Controls implemented to remedy circumstance, mitigate damage, or restore controls

A

Corrective Controls

29
Q

Actions that ensure behavior that complies with established rules

A

Compliance

30
Q

Supports the principle of “least privilege” by providing only authorized individuals, processes, or systems should have access to information on a need to know basis

A

Confidentiality

31
Q

A breach for which it was confirmed that data was actually disclosed to an unauthorized party

A

Data Disclosure

32
Q

A process designed to identify potential events that may affect the entity, manage risk so it is within its risk appetite, & provide reasonable assurance regarding the achievement of entity objectives

A

Enterprise Risk Management

33
Q

Controls implemented to restore conditions to normal after a security

A

Recovery Controls

34
Q

The practice of passing on the risk in question to another entity, such as an insurance company

A

Risk Transfer

35
Q

Any single input to a process that, if missing, would cause the process or several processes to be unable to function

A

Single Point of Failure

36
Q

Authorized the President to regulate exports of civilian goods & technologies that have military applications

A

Export Administration Act of `979

37
Q

Proprietary business or technical information, processes, designs, practices that are confidential & critical to the business

A

Trade Secret

38
Q

Any word, name, symbol, color, sound, product shape, device, or combination of these that is used to identify goods & distinguish them from those made or sold by others

A

Trademarl

39
Q

Controls that substitute for the loss of primary controls & mitigate risk down to an acceptable level

A

Compensating Controls

40
Q

A systematic process for identifying, analyzing, evaluating, remedying, & monitoring risk

A

Risk Management

41
Q

Controls designed to specify acceptable rules of behavior within an organization

A

Directive Controls

42
Q

A security event that compromises the confidentiality, integrity, or availability of an information asset

A

Incident