CGRC Week 3 Flashcards

1
Q

What is the objective of Risk Management?

A

1) Better Secure IT Systems
2) Well-informed risk management DECISIONS
3) Authorizing IT Systems
4) CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Risk Management?

A

Identifying, Assessing, Mitigating/Reduce/Control Risks to an acceptable level. This process includes Risk identification, assessment, control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is risk identification?

A

Process of examining and documenting organisational assets both tangible and non-tangible. People, data, hardware, software, and systems, threats and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 9 steps of the NIST (SP 800-30) Methodology?

A

1) System Characterization
2) Threat Identification
3) Vulnerability Identification
4) Control Analysis
5) Likelihood Determination
6) Impact Analysis
7) Risk Determination
8) Control Recommendations
9) Results Documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the approach to risk identification

A

Know yourself & Know your enemy

Know yourself: Understand your assets and systems

Know your enemy: Identify threats to your organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the steps of risk identification?

A

1) Identify & Inventory Assets
2) Identify & Prioritize Assets
3) Identify & Prioritize Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the risk identification process

A

Risk identification is process of self-examination of Identifying, Classifying, Prioritizing

Identifying your organizational assets
Classifying assets into groups
Prioritizing them by their overall importance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does a threat assessment process do with risks?

A

It identifies and quantifies the risks facing each asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the first step of the risk identification and the process?

A

Follow project management principles such as:
1) Organising a team

Planning the process includes:
1) Periodic Deliverables
2) Reviews
3) Presentation to the management

Basically, Tasks should be laid out, assignments made and timetables discussed.

Plan & Organise the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is asset Identification and Inventory

A

It is an iterative process; identification of assets, people, procedures, data/information, software & hardware and networking, both tangible and intangible assets.

At this stage it is just inventorying and categorizing the assets (value of it does not matter). Afterwards, it is asset classification.

Inventory & Categorize assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a classification scheme?

A

It categorizes information assets based on their sensitivity and security needs

Classify & prioritise assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Information Asset Valuation involve?

A

1) Assigning Relative Values
- Identified, Categorized, Classified
- Use comparative judgments to determine which information asset is of highest value/priority

2) Ask Relevant Questions

3) Information asset prioritisation
- List the assets in order of importance
- Creates weighting on each category based on the answers to questions
- Calculates and lists the relative importance of each asset using weighted factor analysis worksheet

Classify & prioritise assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Under what circumstance your project scope becomes too complex?

A

If you assume that every threat can and will attack every information asset

Identify & prioritise threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to make projects less unweidly?

A

Threat identification and vulnerability identification processes must be managed separately then coordinated at the end

Identify & prioritise threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the components of risk identification (In order). Give a brief description on them.

A

1) Plan & organise
- Organise a team and plan out deliverables, reviews, presentation to management.

2) Categorize system components
- e.g. IT System components (categorization name)
- e.g. Risk management components (categorization name)

3) Inventory & categorise assets
- Each categorized asset attributes
- People, procedures, data/information, software, hardware, and networking

Example:
People: position name/number/ID
Procedures: descriptions, purpose, elements tied to
Data: classification, owner/creator/manager, size, who used?

4) Classify & Prioritise assets
- Classification of information assets
- Reviewing classifications periodically
- Determine whether the asset categories are meaningful

Information Asset:
- Reflects asset sensitivity and security priority
- Information assets are identified, categorized, classified
- Uses comparative judgments to ensure the most valuable information assets are given the highest priority
- Ask relevant questions
- Prioritization of assets (In Order of Importance)

5) Identify & Prioritise threats
- Prioritize and identify Threats and Threat-agents
- Threat assessments

6) Specify asset vulnerabilities
- Review each asset against each threat (Creation of vulnerabilities that is a potential risk to the organization)
- This list serves the next step which is risk assessment
- TVA worksheet (List of assets and their vulnerabilties), weighted table on vulnerabilities

Plan & organise - Categorize system components - Inventory & categorize assets - Classify & Prioritise assets - Identify & Prioritise threats - Specify asset vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly