13.2 Common applications of risk management practice Flashcards

1
Q

What are the four risk management disciplines discussed in chapter 13?

A

Operational risk management
Cyber risk management
Project risk management
Supply chain risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where specialists exist for risk sub-disciplines, care must be taken to avoid a s___-based approach to risk management.

A

silo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is one method for avoiding a silo approach to risk management?

A

Enterprise Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List three possible adverse affects caused by a loss event.

A
Increased costs, e.g. replacing machinery
Loss of operational efficiency
Business interruption
Customer complaints
Reputations damage
Compliance breaches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of operations risk management?

A

To reduce the probability and impact of operations related loss events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of risk is an organisation exposed to when it uses IT equipment, especially the internet?

A

Cyber risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the term for the practice of assuring that an organisation’s information and technical resources are secure, only accessible to authorised personnel, used only for the intended purposes and are complete and intact?

A

Information Assurance (IA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information Assurance is broken down into distinct areas:

I\_\_\_\_\_\_\_\_
Availability
Authenticity
Non-R\_\_\_\_\_\_\_\_\_\_
C\_\_\_\_\_\_\_\_\_\_
A

Integrity
Non-repudiation
Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How has cyber risk evolved in recent years?

A

Cyber risk used to be primarily about protecting information, but is increasingly concerned with how employees communicate online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the five types of cyber controls listed by Ashby?

Hint - TPPPL

A
Technical controls
Physical controls
Procedural controls
People controls
Legal controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ward provides a 9 step process for managing risk within projects:

1 D_____ - scope of the project
2 Focus - agreed risk management objectives
3 I______ - risks and opportunities
4 Structure - according to type, severity
5 O________ - assigns risks to owners
6 Estimate - continue to estimate risk exposure
7 E_______ - project risk management
8 Plan - project/risk management plans
9 M______ - control project through its lifetime

A
Define
Identify
Ownership
Evaluate
Manage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the name of the formal methodology for managing projects, including the risks associated with projects?

A

PRINCE2 - PRojects IN Controlled Environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Within the PRINCE2 approach, risks are captured in i____ registers and q______ registers.

A

issue

quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a supply chain?

A

A network of organisations and people that work together to produce a good or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give 2 examples of supply chain loss events.

A

Upstream suppliers late delivering (or don’t deliver)
Reputation events, such as issues with slavery
Cost of upstream supplies increases unexpectedly
Payment and other legal disputes
Environmental risks due to pollution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Give two examples of CAUSES of supply chain loss events.

A

Banktruptcy of an upstream supplier
Change in specification of an order not yet fulfilled
Cyber risks such as hacking
Financial risks affecting costs and prices
Human error
Socio-political factors such as importing
Weather events such as flooding

17
Q

Why is it importantthat governance and compliance arrangements upstream and downstream work within the supply chain?

A

To avoid contagion risk and supply chain disruption

18
Q

How did Toyota avoid disaster when a key brake supplier halted production following a fire?

A

By rescuing equipment and otsourcing to another supplier at short notice.