Chapter 1 Flashcards
Risk Assessment
Deals with threats, vulnerabilities, and impacts of a loss of information processing capability or a loss of information itself
Vulnerability
weakness that can be exploited by a threat
Key components of the risk assessment process
Risks to which the organization is exposed
Risks that need addressing
Coordination with BIA
Risks to which the organization is exposed
Develop scenarios that can help deal with risks as they occur
Risks that need addressing
Deciding which risks are likely and unlikely
Coordination with BIA
Business impact analysis provides an accurate picture of the threats facing the organization
ALE
Annual Loss Expectancy - expected monetary loss per year
SLE
Single Loss Expectancy - monetary amount lost at one time.
Two components of SLE
AV - Asset Value
EF - Exposure Factor
ARO
Annual Risk of Occurence - Likelihood of an event occuring within a year. Often drawn from historical data
What is the formula used for Risk Assessment?
SLE * ARO = ALE
Threat Vector
Method used by attacker to compromise assets
MTBF
Mean Time Between Failures - Anticipated lifetime of a component. Used for items that can be repaired
MTTF
Mean time to failure - Used for components that cannot be repaired
MTTR
Mean time to restore (or repair) - average downtime for a component
RTO
Recovery Time Objective - the maximum acceptable amount of time that a component can be down.
Beyond this time, outage negatively affects business.
Agreed upon in BIA
RPO
Recovery Point Objective - What point (time or version) of the system will be recovered? The more recent the more expensive
Five approaches to identified risks
Risk Avoidance Risk Transference Risk Mitigation Risk Deterrence Risk Acceptance
Risk Avoidance
Not engaging in the risky activity
Risk Transference
Insurance policy (sharing risk)