5.3 Explain risk management processes and concepts. Flashcards

1
Q

Threat

A

Anything that can harm your resources or could potentially result in a security violation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability

A

Anything that can harm your resources or could potentially result in a security violation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Exploit

A

The act of taking advantage of an identified vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat Vector

A

A path or a tool that a Threat Actor uses to attack the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internal Threat

A

biggest threat because they know your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Asset Value (AV)

A

An asset is defined as any item that has positive economic value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Exposure Factor (EF)

A

The portion of an assets value that is likely to be damaged or destroyed by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Single Loss Expectancy (SLE)

A

AV x EF = SLE
Asset Value x Exposure Factor = Single Loss Expectancy

Represents how much you could expect to lose should a single event occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Annualized Rate of Occurrence (ARO)

A

How often an event is expected to occur in a single year.

Often drawn from Historical data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Annualized Loss Expectancy (ALE)

A

The monetary measure of how much loss a business could expect in a year.

SLE x ARO = ALE
Single Loss Expectancy x Annualized Rate of Occurrance = Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Suppose that an asset is valued at $100,000 with 25% exposure to a threat.
A threat event is expected to occur twice a year.

A

100,000 X .25 = 25,000

25,000 x 2 = 50,000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Likelihood of Occurrence

A

Refers to the probability that a threat event will happen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Quantitative Analysis

A

Refers to the clearest measure (Your have receipts)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Qualitative Analysis

A

What you feel its worth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Acceptance

A

Accepting the threat without any mitigation.

Often the choice that you must make when the cost of implementing any of the other responses exceeds the value of the harm that would occur if the risk came to fruition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Avoidance

A

Involves identifying the risk and making the decision to no longer engage in the actions associated with that risk

17
Q

Mitigation

A

Accomplished any time you take steps to reduce risk

18
Q

Transference

A

Involves bringing in a third party and share the risk.

INSURANCE is transference

19
Q

Change Management

A

A methodology for making modifications to a system and keeping track of those changes.
(Documentation of changes)

20
Q

You’re the administrator of a web server that generates $25,000 per hour in revenue. The probability of the web server failing during the year is estimated to be 25 percent. A failure would lead to three hours of downtime and cost $5,000 in components to correct. What is the ALE?

A

25,000 x 3 = 75,000
75,000 + 5,000 = 80,000
80,000 x .25 = 20,000

$20,000

21
Q

Regarding qualitative versus quantitative measures, which of the following statements is true?
A. Quantitative measures evaluate risk based on a subjective assessment
B. Qualitative measures are less precise
C. Qualitative measures are easier to measure for ROI/RROI
D. Quantitative measures are always better than qualitative measures

A

B. Qualitative measures are less precise

22
Q
Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years. Each breach has cost the company $3,000. A third party vendor has offered to repair the security hole in the system for $25,000. The breached system is scheduled to be replaced in five years. Which of the following should Sara do to address the risk?
A. Accept the risk saving $10,000.
B. Ignore the risk saving $5,000.
C. Mitigate the risk saving $10,000.
D. Transfer the risk saving $5,000.
A

D. Transfer the risk saving $5,000.