Applicable Types of Controls and Control Categories Flashcards

1
Q

What is the primary focus of asset protection activities?

A

To demonstrate the value or contribution of information assets to the organization

This includes files, databases, or knowledge banks that are often central to risk management discussions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can the value of an asset be estimated?

A

Through various calculation methods used in the risk management decision process

This value is crucial for determining the organization’s risk management strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does an outcomes-based viewpoint in risk management identify?

A

Important goals or objectives linked to core business processes

Outcomes can include metrics such as goods sold or timely flights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are safety-critical activities often focused on in risk management?

A

Process-based risk management and mitigation outcomes

These activities ensure that organizational processes operate within safety constraints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the vulnerability-based perspective in risk management focus on?

A

Identified opportunities for systems to be exploited by attackers

This perspective aims to manage risk by addressing these vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the focus of the threat-based perspective in risk management?

A

Human actors with deliberate intentions to harm or disrupt information systems

This perspective emphasizes managing risks posed by potential attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do the four perspectives of risk management operate?

A

All four can operate simultaneously as front lines of defense against cyber attackers

These perspectives include asset-based, outcomes-based, vulnerability-based, and threat-based views.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a common issue faced by small and medium-sized businesses regarding information security?

A

They often do little to no security planning or management

They are encouraged to implement basic cyber hygiene measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the challenge with commonly accepted definitions of cyber hygiene measures?

A

There is no widely accepted definition for what hygiene measures should be or how to assess their effectiveness

This complicates the implementation and monitoring of these measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What actions do larger organizations take regarding risk management?

A

They engage in activities across all four perspectives of risk management

This includes staying current on threats and managing vulnerabilities actively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do threat intelligence activities aim to achieve?

A

To stay current on evolving threats and vulnerabilities

These activities involve collaboration with law enforcement and the information security community.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does continuous process maturation and improvement focus on?

A

The overall benefit and financial or mission terms of important business processes

This relates processes to their most important goals and objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What role do assets and asset valuation play in organizations?

A

They are central to budgeting, resource allocation, and planning

Understanding asset value helps in making informed risk management decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fill in the blank: The four perspectives of risk management include asset-based, outcomes-based, ________, and threat-based.

A

vulnerability-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly