17 Risk Management & Privacy Flashcards

1
Q

What helps organizations prioritize cybersecurity efforts?

A

Risk identification and assessment

This process involves identifying all risks and conducting a business impact analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do cybersecurity analysts conduct to assess the potential degree of risk?

A

Business impact analysis

This analysis is based on the probability of occurrence and the magnitude of potential effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a source of external risk for organizations?

A

Vendors

Organizations should conduct supply chain assessments to mitigate risks from vendors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What reduces the likelihood that a previously unidentified risk at a vendor will negatively impact the organization?

A

Vendor due diligence

This involves assessing the vendor’s systems as part of risk assessment practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What technique verifies that hardware was not tampered with after leaving the vendor’s premises?

A

Hardware source authenticity techniques

These techniques are crucial for ensuring the integrity of hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name one risk management strategy that changes business practices to make a risk irrelevant.

A

Risk avoidance

This strategy modifies practices to eliminate the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are techniques that seek to reduce the probability or magnitude of a risk called?

A

Risk mitigation techniques

These techniques aim to lessen the impact or chance of risks occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What approach moves some of the risk to a third party?

A

Risk transference

This strategy involves outsourcing certain risks to external entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does risk acceptance acknowledge?

A

The presence of the risk

Organizations continue normal operations despite the risk being acknowledged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does disaster recovery planning aim to build?

A

Resiliency

This planning is activated during natural or human-made disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a disaster recovery plan help an organization do?

A

Quickly recover its information and systems

The plan is essential for resuming normal operations after a disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should organizations develop to protect sensitive personal information?

A

Privacy programs

These programs protect personal information from misuse and unauthorized disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What types of information should privacy programs cover?

A
  • Personally identifiable information (PII)
  • Protected health information (PHI)
  • Financial information
  • Other records impacting personal privacy

These elements are crucial for maintaining individual privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly