# Section 04: Information Security Controls

## Information Assurance

## Defense-in-depth

## Risk

## Information Security Risk

> The risk to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation due to the potential for unauthorized access, use, disclosure, disruption, modification, or destruction of information and/or information systems.

Links

* <https://csrc.nist.gov/glossary/term/information_security_risk>

## Risk Matrix

> A risk matrix is a matrix that is used during risk assessment to define the level of risk by considering the category of probability or likelihood against the category of consequence severity.

Links

* <https://en.wikipedia.org/wiki/Risk_matrix>

## Risk Management

> Risk management is the identification, evaluation, and prioritization of risks (defined in ISO 31000 as the effect of uncertainty on objectives) followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities.

## Cyber Threat Intelligence

> Cyber threat intelligence (CTI) is knowledge, skills and experience-based information concerning the occurrence and assessment of both cyber and physical threats and threat actors that is intended to help mitigate potential attacks and harmful events occurring in cyberspace.

### Cyber threat intelligence - tactical

> Technical intelligence (including Indicators of Compromise such as IP addresses, file names, or hashes) which can be used to assist in the identification of threat actors.

### Cyber threat intelligence - operational

> Operational: details of the motivation or capabilities of threat actors, including their tools, techniques and procedures.

### Cyber threat intelligence - strategic

> Strategic: intelligence about the overarching risks associated with cyber threats which can be used to drive high-level organizational strategy.

Links

* <https://en.wikipedia.org/wiki/Cyber_threat_intelligence>

## Threat Modelling

> Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified and enumerated, and countermeasures prioritized.

Links

* <https://en.wikipedia.org/wiki/Threat_model>

## Incident Management

> An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Incident management (IcM) is a term describing the activities of an organization to identify, analyze, and correct hazards to prevent a future re-occurrence.

Links

* <https://en.wikipedia.org/wiki/Incident_management>

## Incident Response Team

> An incident response team (IRT) or emergency response team (ERT) is a group of people who prepare for and respond to an emergency, such as a natural disaster or an interruption of business operations. Incident response teams are common in public service organizations as well as in other organizations, either military or specialty. This team is generally composed of specific members designated before an incident occurs, although under certain circumstances the team may be an ad hoc group of willing volunteers.

Links

* <https://en.wikipedia.org/wiki/Incident_response_team>

## AI and ML

## Artificial Intelligence

> Artificial intelligence (AI) is intelligence demonstrated by machines, as opposed to the natural intelligence displayed by animals and humans. AI research has been defined as the field of study of intelligent agents, which refers to any system that perceives its environment and takes actions that maximize its chance of achieving its goals.

Links

* <https://en.wikipedia.org/wiki/Artificial_intelligence>

## Machine Learning

Machine learning (ML) is a field of inquiry devoted to understanding and building methods that 'learn', that is, methods that leverage data to improve performance on some set of tasks.

Links

* <https://en.wikipedia.org/wiki/Machine_learning>
