2.0 b Risk Management Flashcards

The steps involved in risk management

1
Q

Risk Identification

A

Identifying and documenting potential threats, vulnerabilities, and assets that need protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk Assessment

A

Evaluation the likelihood and potential impact of identified risks to prioritize them based on their severity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk Mitigation

A

Implementing security controls and measures to reduce the likelihood of risk occurrence and its potential impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk Monitoring

A

Continuously monitoring and assessing the effectiveness of implemented controls and adjusting them if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk Response

A

Developing response plans and procedures to address security incidents and minimize their impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk Communication

A

Effectively communication risk-related information to stakeholders, ensuring awareness and understanding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Acceptance or Transfer

A

In cases where the cost of mitigation outweighs the potential impact, organizations may choose to accept the risk or transfer it through insurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Continuous Improvement

A

Cybersecurity risk management is an ongoing process, requiring continuous evaluation and improvement to adapt to evolving threats and changes in the organization’s environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk Avoidance

A

Avoiding activities or practices that pose unacceptable risks, if possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Sharing

A

Sharing the burden of risk with third parties, such as through outsourcing cyber insurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business Impact Analysis (BIA)

A

Assessing the potential consequences of a cybersecurity incident on business operations, functions, and reputation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Governance

A

Establishing policies, procedures , and roles to ensure effective cybersecurity management and accountability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Regulatory compliance

A

Ensuring that cybersecurity practices align with relevant laws, regulation, and industry standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat Intelligence

A

Gathering and analyzing information about emerging cyber threats to proactively adapt security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vulnerability Assessment and penetration Testing (VAPT)

A

Identifying and evaluation Vulnerabilities in systems through testing and simulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Business Continuity Planning (BCP)

A

Developing plans and procedures to ensure essential functions continue in the event of a cybersecurity incident or disaster.

17
Q

Third-Party Risk Management

A

Assessing the cybersecurity risks posed by vendors, suppliers, and partners who have access to sensitive information or systems.

18
Q

Cybersecurity awareness Training

A

Regularly training employees and users to recognize and respond to cyber threats effectively.

19
Q

Data Classification

A

Categorizing data based on its sensitivity to apply appropriate security controls

20
Q

Emerging Technologies Assessment

A

Evaluation the security implications of adopting new technologies before implementation.