1.10 Understand and Apply Risk Management Concepts Flashcards
What questions does Risk Management aim to answer?
What controls should be used and which controls are most effective? | How can assets be adequately protected without enough resources present?
What is a common challenge every organization ponders when implementing Risk Management?
How can be best protect numerous assets with limited resources?
What is risk management?
Risk management is the identification, assessment, and prioritization of risks and the cost-efficient application of resources to minimize the probabiltiy and/or impact of these risks.
What must be understood in order to identify and implement the most cost-effective security control of an asset?
The value of the protected asset.
What is the primary issue regarding controls that are inefficient and not cost-effective?
The value of the organizations is being eroded. Basically, each asset adds value to an organization. | Example: A $100,000 security control to protect an asset that is calculated to cost the company $1,000 per year is not cost-effective at all.
What is the 3 steps when conducting risk management?
- Quantitative and Qualitative Asset Value Analysis | 2. Asset Risk Analysis | 3. Risk Treatment (Avoid, Transfer, Mitigate, Accept)
Why is it important to perform Quantitative/Qualitative Value Analysis on all Assets before performing Risk Analysis?
To determine which assets are most valuable to an organization. This helps identify areas that should rank higher in importance when considering possible treatment measures. | Example: If a single server worth $15,000 is owned by the organzation, it is valuable, but not compared to the 50 employee PC’s estimated at $1,000 a piece.
What four components are used when performing quantitiative or qualitative risk analysis for an asset?
Two Identification Measures | Two Consideration Measures
Threat Analysis: Determining potential Dangers to an Asset. | Vulnerability Analysis: Identifying Weaknesses that could be exploited by an attacker
Impact Consideration: The extent to which an asset would be negatively affected.
Probability/Liklihood Consideration: The chance a risk might materialize due to a given threat or vulnerability.
What are the Four ways a risk can be dealt with?
Avoidance: Negating the risk entirely by avoiding it (Moving hardware to the cloud) | Transference: Purchasing Insurance Policies | Mitigation: Implementing Controls to Reduce Risk | Acceptance: The owner of an asset accepts the level of risk.
Is Risk Management for Previously Assessed Assets Necessary? Why or Why Not?
Yes. Risk Management is an ongoing process as the organization’s technology, threat landscape, vulnerabilities, and impact of risks occuring are constantly changing.
Give examples of assets that can be valued by an organization?
Anything/everything. Building, Equiptment, Critical Business Processes, Company Reputation, and mode.
What two forms of analysis can be used to assess an assets value?
Quantitative and Qualitative analysis.
How should an organize determine which assets are most valuable when performing analysis?
By implementing a ranking system based on the assets determined value.
What are three traits of qualitative analysis?
Does not attempt to assign monetary value | Relative ranking system based on professional judgement and uses words like “Low”, “Medium”, “High”, “1-5”, “Probability” or “Liklihood”. | Relatively simple and efficient.
What are three traits of Quantitative Analysis?
Assigns objective monetrary value to assets | Fully quantitative process when all elements are quantified | Purely quantitative is difficult to achieve and time consuming
Why is risk analysis not effective without support from senior management and asset owners?
Owners best understand the value of an asset to the organization, thereofre owners must be deeply involved in the risk analysis process.
What are the three main components to a risk being present?
The asset potentially at risk | Threats: Any potential dnagers that can cause damage to an assets like natural disasters, hackers, digruntled employees, social engineering, etc. | Vulnerability: Weaknesses that exist, anything that allows a threat gain an advantage and damage an organization. Includes open ports with vulnerable services, lack of network segregation, lack of patching and OS updating.
Name 5 risks and their associated threats and potential vulnerabilites.
- Natural/Environmental - Flood: Building located on a flood plain.
- Human - Hacker: Employee hasn’t been sufficiently trained for social engineering attacks.
- Operational/Process - Process susceptible to Fraud (Issuing checks): No segregation of duties implemented to prevent fraud
- Technical - Malware: Unpatched software.
- Physical - Power Outage: No backup Power System
What equation can be used to calculate risk? (Bonus: Name the factor that can be used to calculate the degree of exposure?)
Risk = Threat * Vulnerability * Impact
What is a Threat Agent in Risk Management?
An entity with the potential to cause damage to an asset (external attackers, disgruntled employees, etc.)
What is a Threat in Risk Management?
Any potential danger.
What is an Attack in Risk Management?
Any harmful action that exploits a vulnerability.
What is a Vulnerability in Risk Managememt?
A weakness in an asset that can be exploited.
What is a Risk in Risk Management?
A significant exposure to a threat or vulnerability. (A weakness that exists in the architecture, process, function, technology, or asset)
What is an Asset in Risk Management?
Anything that is valued by the organzation.
What is Exposure/Impact in Risk Management?
Negative consequences to an asset if the risk is realized (loss of life, reputational damage, downtime, etc.)
What is Countermeasures and Safeguards in Risk Management?
Controls implemented to reduce threat agents, threats, vulnerablities, and reduce the negative impact of a risk realized.
What is a Residual Risk in Risk Management?
The risk that remains after countermeasures and safeguards (controls) are implemented.
Fill in the Risk Management blanks:
______ gives rise to | ______ which exploits | ______ which leads to | ______ which can damage | ______ which causes | ______/______ which can be countered with | ______ and ______ ______ to reduce ______, ______, and ______ which result in | ______ ______.
Includes Residual Risk, Risk, Threat, Threat Agent, vuln, exposure, etc.
Threat Agent gives rise to | Threat which exploits | Vulnerabilities which leads to | Risk which can damage | Assets which causes | exposure/impact which can be countered with | safeguards and counter measures to reduce Threat Agents, Threats, and Vulnerabilties which result in | Mitigated risks
What three Risk Managment terms do Countermeasures and Safeguards reduce?
Threat Agents, Threats, and Vulnerabilities.
How do you calculate Annual Loss Expectency (ALE)?
ALE = SLE (AV * EF) * ARO
What is “Asset Value”?
The cost of the asset in a monetrary value. (i.e., a CCTV that costs $2,000)
What is “Exposure Factor (EF)”? How is this determiend?
Measured as a percentage, expresses how much of the asset’s value stands to be lost in case of a risk materializing. (For instance, if voltage spikes cause a loss of several CCTV cameras a year costing them a total of $200, then the EF is 10%)
CCTV System as a whole is $2,000.
EF is ALWAYS a percentage from 0-100%.
What is Single Loss Expectancy (SLE)? How do you calculate this?
Denotes how much it will cost if the risk occurs once. Calculated by multiplying the Asset Value by the Exposure Value. [SLE = AV * EF]
What is Annualized Rate of Occurrence (ARO)? How do you calculate this?
Denotes how many times each year a risk is likely to occur. For example, if a voltage spike occurs three times a year, the ARO is 3.
What is Annualized Loss Expectancy (ALE)? How do you calculate this?
Expresses as annual cost of the risk materializing. [ALE = SLE * ARO]
Which Component is useful in understanding how much money is a risk is expected to cost an organization each year?
Annual Loss Expectancy (ALE)