03. Risk Monitoring and Reporting Flashcards

1
Q

Risk Monitoring and Reporting

The process of ongoing activities, including control effectiveness assessments and risk assessments, used to observe changes in risk

A

Risk Monitoring

189

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk Monitoring and Reporting

Security Managers perform risk monitoring to report…

A

risk levels to executive management and identify unexpected changes in risk levels

189

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk Monitoring and Reporting

Typical activities that contribute to risk monitoring

A
  1. Internal audits
  2. Control self-assessments
  3. Vulnerability assessments
  4. Risk assessments

189

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk Monitoring and Reporting

The audience of risk monitoring is executive management. Information security managers should describe risks as they pertain to..

A

business impacts and opportunities

Executive management do not care for technical detail. They assume you or the security team will be technical experts in your field

189

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key Risk Indicators

A measure of information risk used to reveal trends related to levels of risk of security incidents in the organisation

A

Key Risk Indicators
(KRI)

Security metrics designed to serve as early indicators of rising or falling risk

189

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key Risk Indicators

The percentage of vulnerabilities in systems supporting revenue operations that are remediated in less than 30 days is a good example of how of a KRI that is present in a manner that…

A

Exectutive manamgent can relate to

190

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Key Risk Indicators

KRIs which communicate increases or decreases in the probability of future security incidents and events is a…

A

leading indicator

190

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Training and Awareness

Information on safe computing, security policy, security procedures, workers security-related responsibilities can be imported to all workers in the organisation through a…

A

Security awareness program

190

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk documentation

a purpose behind documenting business processess is so that they can be…

A

performed consistently and correctly

190

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Documentation

An organisations risk management program should be fully documented to include…

A
  1. Policy and Objectivies
  2. Roles and Responsibilities
  3. Methods and Techniques
  4. Locations for data storage and archives
  5. Risk tolerance
  6. Business rules relating to the risk register
  7. Risk treatmet
  8. Procedures and methods for metrics and KRIs
  9. Communication and escalation protocols
  10. Review cycle

191

How well did you know this?
1
Not at all
2
3
4
5
Perfectly