Chapter 1 Measuring and Weighing Risk Flashcards
SLExARO=ALE
Single Loss Expectancy (how much one loss costs)
x
Annual Rate of Occurence (how likely it is to happen)
=
Annual Loss Expectancy (how much you will lose)
Qualitative vs. Quantitative Risk Assessment
Qualitative
- Opinion based and subjective
- may be valued by the business, bot not necessarily by customers
Quantitative
- Cost-based and subjective
- May impede money making ability
Likelihood (risk)
A score representing the possibility of an event occurring
Can be expressed in qualitative or quantitative terms
Threat Vectors (risk)
The way in which an attacker poses a threat
- May be a tool an attacker would use, the path they may follow, et cetera
- Anything from a fake email to an unsecured hotspot
MTBF (failure risk)
Mean Time Between Failure
-The life expecancy of a system or part that can be repaired
MTTF (failure risk)
Mean Time To Failure
-Average time to failure of an object that must be replaced, not repaired
MTTR (failure risk)
Mean Time To Restore/Repair
-How long it will take to repair or restore a piece of equipment
RTO (failure risk)
Recovery Time Objective
-maximum time a process or service is allowed to be down and the consequences further down time may bring to the company
RPO (failure risk)
The time allowed between recovery point and failure
-Less time is more expensive
Risk Avoidance
Identify the risk, no longer engage in the actions that cause the risk
-Suzie downloaded a virus from a weird FTP server? All right, FTP ports are now blocked.
Risk Transference
Share the burden of risk with someone else, like an insurance company or a cloud storage service
Risk Mitigation
Taking steps to reduce risk
DLP
Data Loss Prevention
-monitors systems to make sure key info isn’t missing. See who’s using and transmitting data.
Risk Deference
Threaten potential enemies to keep them from wanting to initiate an attack on the company
Risk Acceptance
Sometimes the cost of implementing a system outweighs the cost of an attack, or sometimes you simply don’t have the budget to worry about certain attacks.
-These risks MUST be identified and quantified