701 - Chapter 8 Flashcards
What is the likelihood that a threat will exploit a vulnerability called? What is a weakness in a system application or process? And what is a potential danger that might take advantage of a vulnerability called
Risk… vulnerability… threat
What are the two major criteria we use when we evaluate a risk?
The impact… the likelihood or probability of that risk occurring
How does an organization mitigate IT risks?
By using different types of security controls
What are the three IT related threats? And what does an organization use to help identify categorize threats
Malicious human threats, accidental human threats, environmental threats… a threat assessment
What are the five risk types or categories?
Internal, external, intellectual property theft, software compliance and licensing, legacy systems and legacy platforms
What is the practice of identifying, analyzing, monitoring, and limiting risk to a manageable level?
Risk management
What is the acknowledgment that risk exist and must be addressed to mitigate them?
Risk awareness
What refers to the risk that exist before controls are in place to manage the risk? What is the amount of risk that remains after managing or mitigating the risk to an acceptable level? And what refers to the risk that exist if in place controls do not adequately manage risks?
Inherent risk… residual risk… control risk
What refers to the amount of risk in organization is willing to accept? And what is an organizations ability to withstand risk?
Risk appetite… risk tolerance
What is the risk management strategy when an organization does not provide a risky service or does not participate in a risky activity?
Avoidance
What is the risk management strategy when an organization implements controls to reduce risk? What are the two ways that mitigation reduces a risk?
Mitigation… by reducing the vulnerability or by reducing the impact of the threat
What is the risk management strategy when the cost of a control outweigh the risk itself?
Risk acceptance
What is the risk management strategy when an organization transfers, the risk to another entity or at least shares the risk with another entity? And what is a common example of this?
Risk transference… insurance
And what insurance helps protect businesses and individuals from some of the losses related to cyber security incidents?
Cybersecurity insurance
What is the risk management task that quantifies or qualifies risks based on different values or judgments?
Risk assessment
What is any product system resource or process that an organ organization values called? And what is the value of that asset called?
Asset… asset value
Which risk assessment measurement uses numbers, such as a monetary figure representing cost and value? And which use judgments?
Quantitative… qualitative
What examines an organizations known risk and evaluates the effectiveness of in place controls?
A risk control assessment
What are two important factors or variables when doing a quantitative risk assessment? What is the portion of an asset that we expect would be damaged if a risk materializes?
Asset value AV and the exposure factor EF… exposure factor
What is the SLE and how is it calculated?
Single loss expectancy, it is the cost of any single loss of a specific asset… AV x EF
What is the ARO?
Annualized rate of occurrence, and it indicates how many times the loss will occur in a year… it is a measure of probability or likelihood
What is the ALE? How is computed?
Annualized loss expectancy, it brings together the impact and probability/likelihood …SLE x ARO
What is the assessment that uses judgment to categorize risk based on the likelihood of occurrence and impact?
A qualitative risk assessment
What are the two simple guidelines when making a quantitative risk assessment?
If the cost of the control is less than the savings purchase it… if the cost of the control is greater than the savings accept the risk
What is the final phase of the risk assessment called? And what does it identify?
Risk reporting… it identifies the risk discovered and the recommended controls
What are metrics used to measure and monitor the level of risk associated with a particular activity process or system called? What are some examples of KRIs?
Key risk indicators KRI… Number of security incidents detected per month, the percentage of overdue security patches,’the average time to detect and respond to a security incident
What is a comprehensive document listing known information about risks such as the risk owner? And what does it typically include??
Risk register… Risk scores along with recommended security controls to reduce the scores
What plots risks onto a chart?
A risk matrix
What includes all the elements required to produce and sell a product called? And what is one way to reduce reduce the risk to this?
Supply chain… Ensuring that it has multiple sources for everything that is needed
What assesses the security posture of systems and networks, the identify vulnerabilities or weaknesses within systems networks and organization as part of an overall risk management plan?
Vulnerability assessment
What uses various techniques to gather information about hosts within a network?
A network scanner
What are the five methods that a network scanner uses?
ARP ping scan, syn stealth scan, port-scan, service scan and OS detection