SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start

level: Ch. 1:Risk & Assessment

Questions and Answers List

level questions: Ch. 1:Risk & Assessment

QuestionAnswer
1. Environmental 2. Manmade 3. Internal vs. ExternalThree primary categories of threats
graphical tool that is used to identify threats; initially a scatterplot of possible problem areasrisk register
1. annual loss expectancy 2. single loss expectancy 3. annualized rate of occurrence3 terms used to determine the impact of an event (for the purpose of risk assessment)
SLE x ARO = ALEformula for computing risk assessment
used to look at vendors your organization works with strategically and the potential risks the introduce.supply chain assessment
the way in which an attacker poses a threatthreat vector
phishing or rough access point (unsecured hotspot)examples of threat vectors
MTBF is the avg time to failure for a NONREPAIRABLE system. If the system can be repaired, the MTBF is measurement to focus on, but if it cannot, then MTTF is the # to examine.Difference between Mean Time Between Failures(MTBF) and Mean Time to Failure(MTTF)
Identifies the adverse impacts that can be associated with the destruction, corruption, or loss of accountability of data for the organization. *Often associated with the business impact analysis.privacy impact assessment
1. ensure conformance with applicable legal, regulatory, and policy 2. determine risks and effects 3. evaluate protections and alt processes to mitigate potential privacy risksAccording to the Dept. of Homeland Security, the privacy impact assessment (PIA) need 3 things....
1. penetration testing 2. vulnerability testing2 test that can help identify risk
1. avoidance 2. transference 3. mitigation 4. acceptance5 responses to risk
mitigation, auditsCompTIA is fond of risk __________ and confronting it through the use of routine _____ that address user rights and permission; change management.
DLP systems monitor the contents of systems to make sure that key content is not deleted or removed.Data loss prevention (DLP)
yesCan risk strategies such as risk mitigation, risk transference, and risk avoidance be combined?
hosting services and data on the internet instead of hosting it locally. "the cloud"cloud computing
1. Platform as a Service 2. Software as a Service 3. Infrastructure as a Service3 different ways to implement cloud computing
Vendors allow apps to be created and run on their infrastructure. Ex: Amazon Web Service.Platform as a Service (PaaS)
utilizes virtualization, and clients pay a cloud service provider for resources used.infrastructure as a service (IaaS)
apps are remotely run over the web. No local hardware is required.Software as a Services
utilizes virtualization, and clients pay a cloud service provider for resources used.Infrastructure as a Service