WGU D488 CYBERSECURITY
ARCHITECTURE AND ENGINEERING
STUDY GUIDE FOR END SEMESTER
PAPER EXAM 2026
Impact
The severity of a threat if realized.
Single Loss Expectancy (SLE)
The amount of loss in a single occurrence of the risk factor.
Annual Rate of Occurrence (ARO)
The amount of single occurrence that happen in a year.
Annual Loss Expectancy (ALE)
Estimate of the amount of loss that occurs over a year.
ALE = SLE x ARO
Quantitative risk
The challenge of quantitative risk as that the cost of components or equipment is not
always clear.
Mean Time To Recovery (MTTR)
The average time that a device will take to recover from any failure.
Mean Time Between Failures (MTBF)
the average length of time between failures of a product or component
List Cybersecurity Framework 5 core functions
1. identity
2. Protect
3. Detect
4. Respond
5. Recover
Cybersecurity
,Cybersecurity
Residual Risk
the risk that remains after management implements internal controls or some other
response to risk
Risk Appetite
The amount of risk a company is willing to accept to achieve its goals and objectives. To
avoid undue risk, risk appetite must be in alignment with company strategy.
ISO 31000 Framework
- used to integrate the risk management process into their management and operational
systems
- can be adapted to an organization's specific operations and objectives
begins with an evaluation of an organization's risk contexts, including all major factors
both inside and outside the organization that affect its objective's and operation's
COBIT Framework
- current framework version is COBIT5
- based on the following principles:
- meeting stakeholder needs
- covering the enterprise end-to-end
- applying a single, integrated framework
- enabling a holistic approach
- separating governance from management
COSO
Committee of Sponsoring Organizations of the Treadway Commission an initiative of 5
private sector organizations collaborating on the development of risk management
frameworks.
Risk Management Life cycle phases
identify
Assess
Control
Review
NIST Cybersecurity Framework core
Cybersecurity
,Cybersecurity
Identify
Protect
Detect
Respond
Recover
KPI (Key Performance Indicator)
A formal mechanism designed to measure performance of a program against desired
goals.
Key risk indicators (KRIs)
Metrics that provide an early warning of increasing levels of uncertainty in a particular
business area.
Risk Register
A document in which the results of risk analysis and risk response planning are
recorded.
tradeoff analysis
Comparing potential benefits to potential risks and determining a course of action based
on adjusting factors that contribute to each area
Managing people risks
Separation of duties
Job rotation
Mandatory vacation
Least Privilege
Employment and Term Procedures
Software as a Service (SaaS)
represents the lowest amount of responsibility for the customer as the facilities, utilities,
physical security, platform and applications are the responsibility of the provider
platform as as service
Provides a selection of operating systems that can be loaded and configured by the
customer, the underlying infrastructure, facilities, utilities, and physical security are the
responsibility of the provider.
Infrastructure as a Service (IaaS)
Cybersecurity
, Cybersecurity
Provides the hardware hosted at the provider facility using the providers physical
security controls and utilities, such as power.
Vendor Lock-in
When a customer is completely dependent on a vendor for products or services
because switching is either impossible or would result in substantial complexity and
costs.
Vendor Lock-out
When a vendors product is developed in a way that makes it inoperable with other
products, the ability to integrate with other vendor products is not a feasible option, or
does not exist.
Vendor Viability
A vendor that has a viable and in-demand product and the financial means to remain in
business on an ongoing basis.
Source Code Escrow
Identifies that a copy of vendor developed source code is provided to a trusted third
party in case the vendor ceases to be in business
Support Availability
Defines the steps taken to verify the type and level of support to be provided by the
vendor in support of their product or service. Often defined by an SLA
meeting client requirements
Describes the formal measures taken to validate that the vendor's delivered service or
product offering aligns to established requirements
Incident reporting Requirements
Legal contracts should clearly identify the requirement for vendors to provide timely
notification regarding any security incidents
Supply Chain
Describes all of the suppliers, vendors, and partners needed to deliver a final product.
Cloud Security Alliance (CSA) Security Trust and Risk (STAR)
Program that demonstrates a cloud service providers adherence to key principles of
transparency, auditing, and best practice security operations
System and Organization Controls (SOC)
Cybersecurity