1.10 Understand and Apply Risk Management Concepts Flashcards

1
Q

What questions does Risk Management aim to answer?

A

What controls should be used and which controls are most effective? | How can assets be adequately protected without enough resources present?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a common challenge every organization ponders when implementing Risk Management?

A

How can be best protect numerous assets with limited resources?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is risk management?

A

Risk management is the identification, assessment, and prioritization of risks and the cost-efficient application of resources to minimize the probabiltiy and/or impact of these risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What must be understood in order to identify and implement the most cost-effective security control of an asset?

A

The value of the protected asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary issue regarding controls that are inefficient and not cost-effective?

A

The value of the organizations is being eroded. Basically, each asset adds value to an organization. | Example: A $100,000 security control to protect an asset that is calculated to cost the company $1,000 per year is not cost-effective at all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the 3 steps when conducting risk management?

A
  1. Quantitative and Qualitative Asset Value Analysis | 2. Asset Risk Analysis | 3. Risk Treatment (Avoid, Transfer, Mitigate, Accept)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is it important to perform Quantitative/Qualitative Value Analysis on all Assets before performing Risk Analysis?

A

To determine which assets are most valuable to an organization. This helps identify areas that should rank higher in importance when considering possible treatment measures. | Example: If a single server worth $15,000 is owned by the organzation, it is valuable, but not compared to the 50 employee PC’s estimated at $1,000 a piece.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What four components are used when performing quantitiative or qualitative risk analysis for an asset?

Two Identification Measures | Two Consideration Measures

A

Threat Analysis: Determining potential Dangers to an Asset. | Vulnerability Analysis: Identifying Weaknesses that could be exploited by an attacker

Impact Consideration: The extent to which an asset would be negatively affected.

Probability/Liklihood Consideration: The chance a risk might materialize due to a given threat or vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the Four ways a risk can be dealt with?

A

Avoidance: Negating the risk entirely by avoiding it (Moving hardware to the cloud) | Transference: Purchasing Insurance Policies | Mitigation: Implementing Controls to Reduce Risk | Acceptance: The owner of an asset accepts the level of risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is Risk Management for Previously Assessed Assets Necessary? Why or Why Not?

A

Yes. Risk Management is an ongoing process as the organization’s technology, threat landscape, vulnerabilities, and impact of risks occuring are constantly changing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Give examples of assets that can be valued by an organization?

A

Anything/everything. Building, Equiptment, Critical Business Processes, Company Reputation, and mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What two forms of analysis can be used to assess an assets value?

A

Quantitative and Qualitative analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How should an organize determine which assets are most valuable when performing analysis?

A

By implementing a ranking system based on the assets determined value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are three traits of qualitative analysis?

A

Does not attempt to assign monetary value | Relative ranking system based on professional judgement and uses words like “Low”, “Medium”, “High”, “1-5”, “Probability” or “Liklihood”. | Relatively simple and efficient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are three traits of Quantitative Analysis?

A

Assigns objective monetrary value to assets | Fully quantitative process when all elements are quantified | Purely quantitative is difficult to achieve and time consuming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is risk analysis not effective without support from senior management and asset owners?

A

Owners best understand the value of an asset to the organization, thereofre owners must be deeply involved in the risk analysis process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the three main components to a risk being present?

A

The asset potentially at risk | Threats: Any potential dnagers that can cause damage to an assets like natural disasters, hackers, digruntled employees, social engineering, etc. | Vulnerability: Weaknesses that exist, anything that allows a threat gain an advantage and damage an organization. Includes open ports with vulnerable services, lack of network segregation, lack of patching and OS updating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name 5 risks and their associated threats and potential vulnerabilites.

A
  1. Natural/Environmental - Flood: Building located on a flood plain.
  2. Human - Hacker: Employee hasn’t been sufficiently trained for social engineering attacks.
  3. Operational/Process - Process susceptible to Fraud (Issuing checks): No segregation of duties implemented to prevent fraud
  4. Technical - Malware: Unpatched software.
  5. Physical - Power Outage: No backup Power System
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What equation can be used to calculate risk? (Bonus: Name the factor that can be used to calculate the degree of exposure?)

A

Risk = Threat * Vulnerability * Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a Threat Agent in Risk Management?

A

An entity with the potential to cause damage to an asset (external attackers, disgruntled employees, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Threat in Risk Management?

A

Any potential danger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is an Attack in Risk Management?

A

Any harmful action that exploits a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Vulnerability in Risk Managememt?

A

A weakness in an asset that can be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a Risk in Risk Management?

A

A significant exposure to a threat or vulnerability. (A weakness that exists in the architecture, process, function, technology, or asset)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is an Asset in Risk Management?

A

Anything that is valued by the organzation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is Exposure/Impact in Risk Management?

A

Negative consequences to an asset if the risk is realized (loss of life, reputational damage, downtime, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is Countermeasures and Safeguards in Risk Management?

A

Controls implemented to reduce threat agents, threats, vulnerablities, and reduce the negative impact of a risk realized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a Residual Risk in Risk Management?

A

The risk that remains after countermeasures and safeguards (controls) are implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Fill in the Risk Management blanks:
______ gives rise to | ______ which exploits | ______ which leads to | ______ which can damage | ______ which causes | ______/______ which can be countered with | ______ and ______ ______ to reduce ______, ______, and ______ which result in | ______ ______.

Includes Residual Risk, Risk, Threat, Threat Agent, vuln, exposure, etc.

A

Threat Agent gives rise to | Threat which exploits | Vulnerabilities which leads to | Risk which can damage | Assets which causes | exposure/impact which can be countered with | safeguards and counter measures to reduce Threat Agents, Threats, and Vulnerabilties which result in | Mitigated risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What three Risk Managment terms do Countermeasures and Safeguards reduce?

A

Threat Agents, Threats, and Vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How do you calculate Annual Loss Expectency (ALE)?

A

ALE = SLE (AV * EF) * ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is “Asset Value”?

A

The cost of the asset in a monetrary value. (i.e., a CCTV that costs $2,000)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is “Exposure Factor (EF)”? How is this determiend?

A

Measured as a percentage, expresses how much of the asset’s value stands to be lost in case of a risk materializing. (For instance, if voltage spikes cause a loss of several CCTV cameras a year costing them a total of $200, then the EF is 10%)

CCTV System as a whole is $2,000.

EF is ALWAYS a percentage from 0-100%.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is Single Loss Expectancy (SLE)? How do you calculate this?

A

Denotes how much it will cost if the risk occurs once. Calculated by multiplying the Asset Value by the Exposure Value. [SLE = AV * EF]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is Annualized Rate of Occurrence (ARO)? How do you calculate this?

A

Denotes how many times each year a risk is likely to occur. For example, if a voltage spike occurs three times a year, the ARO is 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is Annualized Loss Expectancy (ALE)? How do you calculate this?

A

Expresses as annual cost of the risk materializing. [ALE = SLE * ARO]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which Component is useful in understanding how much money is a risk is expected to cost an organization each year?

A

Annual Loss Expectancy (ALE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

When should a company accept a risk rather than implement controls to mitigate the risk?

A

When the cost of mitigation exceeds the value of the asset.

39
Q

How do you calculate the Annual Loss Expectancy (ALE) when you know the Annual Rate of Occurrence (ARO), Asset Value, and Exposure Factor?

i.e. ARO = 5, Asset Value = $2,000, Exposure Factor = 50%.

A

You first fidn the Single Loss Expectancy (SLE) by multiplying the Asset Value * Exposure Factor. [$2,000 * 25% = $500]. Then calculate: ALE = SLE ($500) * ARO (5). The total here would be: ALE = $2,500.

40
Q

What are the 4 Methods an Organization can use to manage Risk?

A

Avoid | Mitigate | Transfer | Accept

41
Q

What does it mean to Avoid Risk? What are some drawbacks?

A

To entirely remove the organization from the risk. For example, only building in-land to avoid hurricanes. | This can cause a loss in opportunity cost since organizations on the coast may not do business. | Organizational expasion requires risk to grow, so no all risk should be avoided.

42
Q

What does it mean to Transfer Risk? What are some drawbacks?

A

Transference means to share the risk with another party, such as insurance companies. For a premium, the insurance company will cover a bulk of the impact if a risk actualizes. | Responsibilty is transferred, though accountability cannot be transferred.

43
Q

What does it mean to Mitigate Risk? Is this a preferred method? Why/Why not?

A

Mitigation involves implementing controls to reduce the risk to an acceptable level. | Yes. Risk cannot be reduced to zero, though it can be reduced to a point where acceptance or transference is safe to occur.

44
Q

What does it mean to Accept Risk? When does this occur? Who should make this decision?

A

Simply put, to take no action of further action where risk to an asset is concerned. | Happens when cost to control risk exceeds the value of an asset. Another example is accepting residual risk after mitigation controls have been put in place. | The asset owner or senior management should be the only ones to make this call since they are accountable for the asset.

45
Q

What is Risk Ignorance? How does this relate to Due Care and Due Diligence?

A

Ignoring a risk entirely. This does not adhere to due care or due diligence and can lead to financial fines and reputational damages.

46
Q

What are the Seven Types of Major Risk Controls?

A

Compensating, Corrective, Detective, Deterrent, Directive, Preventive, and Recovery.

47
Q

What is a Directive Control? Provide an example.

A

Direct, Confine, or control the actions of subjects to force or encourage compliance with Security Policies. | A Fire Exit Sign.

48
Q

What is a Detterent Control? Provide an example.

A

A control that discourage violation of security policies | A ‘Tresspassers will be shot’ sign. Anything that deters, but cannot stop, someone.

49
Q

What is a Preventive Control? Provide an example.

A

Anything that prevent undesired actions or events. | A fence that prevents someone from walking on the propery or not having flammable materials around.

50
Q

What is a Detective Control? Provide an example.

A

Anything used to identify if a risk has occurred | A smoke alarm

51
Q

What is a Corrective Control? Provide an example.

A

Anything used to minimize the negative impact of a risk occurring/minimize the damage | A fire suppression system.

52
Q

What is a Recovery Control? Provide an example.

A

Designed to revocer a system or process and return to normal operation following an incident | A data backup policy allowing restoration of data on an affected server after an incident takes place.

53
Q

What is a Compensating Control? Provide an example.

A

Typically deployed with other controls to aid in reinforcement and supplement their effectiveness. | Example is a Host-Intrusion Detection System (HIDS) being deployed on a critical server, even though a Network Intrusion Protection System (NIPS) exists on the subnet. The HIDS compensates the NIPS by allowing additional detection of risk if a malicious actor bypasses NIPS and gets access to the critical server.

54
Q

What is Defense-in-Depth?

A

Defense in Depth is layered security which uses multiple controls at each layer to ensure security.

55
Q

How can a company obtain “Complete” control of a risk?

A

By using a combination of Preventive, Detective, and Corrective controls against a risk.

56
Q

What controls are enforced AFTER an incident occurs?

A

Recovery, Corrective, and Detective.

57
Q

What controls are enforced BEFORE an incident occurs?

A

Deterrent, Directive, Compensating, Preventive.

58
Q

Are Safeguards Proactive or Reactive? Why?

A

Safeguards are proactive because they are put in place before a risk has occured to deter or prevent it from manifesting.

59
Q

Are Countermeasures Proactive or Reactive? Why?

A

Countermeasures are reactive because they are put in place after a risk has actualized, which allow us to detect and respond accrodingly.

60
Q

What Controls are considered Countermeasures?

A

Recovery, Corrective, and Detective.

61
Q

What Controls are considered Safeguards?

A

Preventive, Directive, Deterrent, and Compensating.

62
Q

What Three Categories can Controls be classifed into?

A

Administrative, Logical/Technical, and Physical.

63
Q

What is an Administrative Control? Give an example.

A

Policies, Procedures, Baselines, and guidelines are all classified as administrative controls. This also includes background checks, acceptable use, network policy, onboarding/offboarding policies, and similar things that are documents and processes.

64
Q

What is a Logical/Technical Control? Give some examples.

A

Firewalls, Intrusion Prevention Systems (IPS)/Intrusion Detection Systems (IDS), Anti-Virus (AV), antimalware, proxies, and similar tools.

65
Q

What is a Physical Control? Give some examples.

A

Doors, fences, gates, mantraps, guards, CCTV, etc.

66
Q

What is the discerning difference between Logical and Technical Controls?

A

Logical Controls are the software components, Technical Controls are the hardware components.

67
Q

What are examples of some Control Types when paired with a classification?

A

See Page 52 of CISSP Training Guide. (Table 1-22)

68
Q

What two Aspect Types be considered when implementing a Control?

A

Functional Aspects and Assurance Aspects.

69
Q

What is a Functional Aspect of a control? Give an example.

A

A funcitonal aspect ensure the control does the function it was designed to addressed/does what it is meant to do. | A firewall filtering traffic between subnets.

70
Q

What is a Assurance Aspect of a control? Give an example.

A

Control can be proven to be functioning properly on an ongoing basis | Proven trough testing, assessments, logging, and monitoring.

71
Q

Why is implementing any security control always have a negative impact on an organization?

A

Security controls make systems more difficult to use, slower, more complicated, and so on.

72
Q

Is ‘security for the sake of security’ okay?

A

No. Security controls should always be balanced between maximum security for a minimal cost.

73
Q

What criteria should be considered when evaluating what controls to implement?

A

Alignment with the organization’s goals | Cost-effectiveness | Complete Control (Preventive, Detective, and Corrective at a Minimum) | Functional and Assurance effectiveness.

74
Q

What is the best way to determine if an implemented security control is effective?

A

Metrics! :)

75
Q

“Metrics that Matter” is found when you overlap what two ideas?

A

Risk Metrics and Audience.

76
Q

The Demin Cycle, as known as the Plan Do Check Act (PDCA) cycle, is used to demonstrat what process?

A

The ongoing Risk Management Cycle.

77
Q

Describe each step of the Plan Do Check Act (PDCA) cycle.

A

Plan: Determine what controls to implement based on identified risk | Do: Implement Controls | Check: Monitor and Assurance, are controls operating effectively? | Act: Based upon findings, take actions if necessary and go back to the “Plan” stage if so.

78
Q

How often should a Risk Analysis be conducted? What determines this?

A

As often as necessary. | Frequency will depend on the nature of the business and assocaited risks, and should be triggered by a change in the value of an asset.

79
Q

What are some items involved in assuring Risk Management with third-party providers and services?

A

Governance Review | Site Security Review | Formal Security Audit | Penetration Testing | Adherence to Security Baselines | Evaluation of Hardware and Software | Adherence to Security Policies | Development of an Assessment Plan | Identification of Assessment Requirements for each Involved Party | Preparation of Assessment and Reporting Templates

80
Q

Who is ultimately accountable if there is an exploited risk in the supply chain that involved customer data?

A

Ultimately, the data owner. | The data owner is responsible for ensuring the third party service has appropriate risk management processes in place to protect the provided data.

81
Q

How can Risk Management Frameworks help a newly hired Risk Manager?

A

They provide a sort of template with best practices for identifying assets, risks, threats, and vulnerabilities.

82
Q

What are four popular Risk Management Frameworks?

A

NIST SP 800-37 Risk Management Framework (RMF) | ISO 31000 | CPSP | anmd ISACA Risk IT Framework

83
Q

What is the NIST SP 800-37 RMF?

A

A guide describing the guidelines for applying the NIST SP 800-37 RMF to Information systems and organizations.

More specifically, used to identify cyber-risks.

84
Q

What is the ISO 31000?

A

A family of standards relating to risk management. The scope is to provide best practice structure and guidance to all organizations concerned with risk management.

85
Q

What is the COSO?

A

Provides a definiotn to essential enterprise risk management components, reviews Enterprise Risk Management (ERM) principles and concepts, and provides direction and guidance for enterprise risk management.

86
Q

What is ISACA Risk IT Framework?

A

Containg guidelines and practices for risk optimization, security, and business value. The latest version places greates emphasis on cybersecurity and aligns with the latest version of COBIT.

87
Q

What steps are involved in the NIST SP 800-37 Risk Management Framework (RMF)?

A

Prepare to execute the RMF | Categorize Information Systems | Select Security Controls | Implement Security Controls | Assess Security Controls | Authorize Information Systems |and Monitor Security Controls

88
Q

According to the NIST SP 800-37 Risk Management Framework (RMF) what occurs during the “Categorize Information Systems” steps?

A

Information Systems are identified and categorized. Purpose is to determine any potential adverse impacts to the CIA (triad) of organizational operations and assets, thereby informing the organizational risk management process.

89
Q

According to the NIST SP 800-37 Risk Management Framework (RMF) what occurs during the “Select Security Controls” steps?

A

Following risk assessment, controls such as management, operational, and technical safeguards or countermeasures are embedded into information systems. They are selected to protect the CIA of those systems and the information they contain.

90
Q

According to the NIST SP 800-37 Risk Management Framework (RMF) what occurs during the “Implement Security Controls” steps?

A

Contains two key tasks: 1) Implement selected security controls in the security and privacy plans and 2) Document the specific, baseline details of the control implementation. | The latter task is critical to ensure everyone understand what controls exist and to understand the controls in the context of the larger operational framework of the organization.

91
Q

According to the NIST SP 800-37 Risk Management Framework (RMF) what occurs during the “Assess Security Controls” steps?

A

Helps to determine if security controls are implemented correctly, operating as intended, and meeting the security and privacy requirements for the organization. | This step inolves formulation of a comprehensive plan that must be reviewed and approved.

92
Q

According to the NIST SP 800-37 Risk Management Framework (RMF) what occurs during the “Authorize Information Systems” steps?

A

Requires Senior Management to decide whether it’s acceptbale to operate the system in question, given the potential risk, controls, and residual risk. As well, senior management should review the plan of action related to residual risk. Finally, authorization or approval is given for a set period of time that is tied to milestones in the Plan of Actions Milestons (POA&M), which facilitates tracking and status of failed controls.

93
Q

According to the NIST Monitor Security Controls” steps?

A

Also referred to as the “Continous Improvement” step. During this, questions such as “Are our security controls effective”? and “Have new vulnerabilites developed?” are examined. Automated tools have made this step executable in real-time. This helps with configuration drift and other potential security incidents associated with unexpected change on different core components and their configurations.