Chapter 1 mod 2 Flashcards

1
Q

What is the primary connection between information assurance, cybersecurity, and the risk management process?

A

The risk management process is closely involved with information assurance and cybersecurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does the required level of cybersecurity relate to the entity’s willingness to accept risk?

A

The required level of cybersecurity depends on the level of risk the entity is willing to accept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of evaluating risk in the implementation of security controls?

A

Evaluating risk helps determine the implementation of security controls to an acceptable level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some examples of risks mentioned in the text, apart from cyberattacks?

A

Risks include fire, violent crime, and natural disasters, among others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do well-designed risk management technologies aid in dealing with vulnerabilities and threats?

A

Well-designed risk management technologies help recognize vulnerabilities and threats effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are examples of cyberattacks discussed in the text?

A

Examples include malware, social engineering, and denial-of-service attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the significance of calculating the likelihood and potential impact of each threat in risk management?

A

Calculating likelihood and potential impact helps assess and manage the risks effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define “malware” and explain its role in the context of cybersecurity.

A

Malware refers to malicious software and poses a significant threat in the cybersecurity domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the concept of social engineering and its relevance to cybersecurity risks.

A

Social engineering involves manipulating individuals to reveal sensitive information and is a cybersecurity risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is it essential to implement security controls, according to the text?

A

Implementing security controls is crucial to mitigating risks to an acceptable level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the context of cybersecurity, what factors influence the level of risk and its acceptance?

A

The potential consequences of activities in the environment influence the level of risk and its acceptance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do natural disasters contribute to the risk landscape discussed in the text?

A

Natural disasters are cited as situations affecting the environment and adding to the risk landscape.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Discuss the role of risk management in recognizing vulnerabilities and threats.

A

Risk management plays a key role in recognizing vulnerabilities and threats through well-designed technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define a vulnerability in the context of cybersecurity.

A

A vulnerability is described as a gap or weakness in an organization’s protection of its valuable assets, including information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the role of a threat in the context of cybersecurity?

A

A threat is something or someone aiming to exploit a vulnerability to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain how a threat can harm an asset by exploiting a vulnerability.

A

By exploiting a vulnerability, a threat can harm an asset, leading to potential damage or disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Provide an example of a natural disaster acting as a threat in the context of cybersecurity.

A

An example is a major storm posing a threat to the utility power supply, which is vulnerable to flooding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Identify an asset in the given scenario and explain its vulnerability.

A

The IT environment where production takes place is an asset, and its vulnerability is the dependence on the utility power supply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How can a storm, as mentioned in the text, impact the availability of the IT environment?

A

The storm may cut off the utility power supply, making the IT components unavailable since they won’t work without power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the primary responsibility mentioned in the text regarding cybersecurity and risk management?

A

The primary responsibility is to evaluate the likelihood of an event and take appropriate actions to mitigate the associated risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In the given context, why is the utility power supply considered vulnerable to a natural disaster?

A

The utility power supply is vulnerable because it is susceptible to flooding during a natural disaster like a major storm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does the text describe the relationship between vulnerabilities and assets in a cybersecurity context?

A

Vulnerabilities are gaps or weaknesses in the protection of valuable assets, including information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the significance of evaluating the likelihood of an event in the context of risk management?

A

Evaluating likelihood is crucial for taking appropriate actions to mitigate the risk associated with potential events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define the term “asset” in the context of risk management terminology.

A

An asset is something in need of protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Explain what a vulnerability represents in the realm of operational risk management.

A

A vulnerability is an inherent weakness or flaw in a system or component that, if triggered, could lead to a risk event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the primary goal of an organization’s security team in relation to vulnerabilities?

A

The goal is to decrease vulnerabilities by viewing the organization through the eyes of a threat actor and taking steps to discourage or make attacks more difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define “threat” and provide examples of typical threat actors in cybersecurity.

A

A threat is something or someone aiming to exploit vulnerabilities. Examples include insiders, outside individuals, formal entities (nonpolitical and political), intelligence gatherers, and technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does the term “threat vector” refer to in the context of risk management?

A

A threat vector is the means by which a threat actor carries out their objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Describe the role of security professionals in operational risk management

A

Security professionals use their knowledge to examine operational risk, use risk data effectively, work cross-functionally, and report actionable information to stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Explain the importance of considering the likelihood of a potential vulnerability being exploited in risk management.

A

Likelihood is crucial in assessing the probability of a threat exploiting a vulnerability, considering the organization’s threat environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is impact, and how does it relate to risk management?

A

Impact is the magnitude of harm resulting from unauthorized disclosure, modification, destruction of information, or loss of information system availability. It is a key factor considered in risk management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

How do security teams view their organization when working to decrease vulnerabilities?

A

They view their organization through the eyes of threat actors, asking why the organization might be an attractive target and taking steps to discourage or make attacks more difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

how can an organization decrease its vulnerability?

A

By understanding why it might be an attractive target and taking steps to discourage or make it more difficult for threat actors to launch a successful attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is emphasized as a recurring process in the world of cyber regarding risk identification?

A

Identifying risks is highlighted as a recurring process involving the identification of different possible risks, characterization, and estimating their potential for disrupting the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the significance of understanding your organization’s strategic, tactical, and operational plans in the context of risk identification?

A

Security professionals need to analyze their organization’s plans to effectively identify and characterize unique risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

According to the text, how do security professionals contribute to risk assessment at a system level?

A

Security professionals are likely to assist in risk assessment at a system level, focusing on process, control, monitoring, or incident response and recovery activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Why is risk identification in the cyber realm described as not a “one-and-done” activity?

A

It is a recurring process to continually identify different possible risks and assess their potential impact on the organization.

38
Q

What is the role of employees at all levels in the organization concerning risk identification?

A

Employees at all levels are responsible for identifying risks to contribute to the overall risk identification process.

39
Q

What are the key takeaways mentioned in the text regarding risk identification?

A

Key takeaways include the importance of identifying risks to communicate them clearly, the responsibility of employees at all levels for risk identification, and the role of risk identification in protecting against potential threats.

40
Q

How is risk identification described in the context of walking down the street and noticing loose wires or water on the office floor?

A

Risk identification is compared to walking down the street and being vigilant for potential hazards like loose wires or water, emphasizing the need to be on the lookout for risks.

41
Q

What is the suggested role of security professionals in organizations lacking a risk management and mitigation plan?

A

In organizations lacking a risk management plan, security professionals might have the opportunity to assist in filling the planning void by contributing to risk management and mitigation activities.

42
Q

Explain the connection between risk identification and protecting against risks in the context of the text.

A

Identifying risks is essential to protect against them, as it allows organizations to implement measures and strategies to mitigate potential problems.

43
Q

How does risk identification in cybersecurity relate to assisting in risk assessment at a system level?

A

Risk identification in cybersecurity involves assisting in risk assessment at a system level, focusing on various aspects such as process, control, monitoring, and incident response.

44
Q

Define risk assessment in the context of organizational operations.

A

Risk assessment is the process of identifying, estimating, and prioritizing risks to an organization’s operations, including its mission, functions, image, reputation, assets, individuals, and other organizations.

45
Q

What is the primary goal of a risk assessment, as highlighted in the text?

A

The primary goal of a risk assessment is to estimate and prioritize risks associated with the operation of an information system.

46
Q

How does a risk assessment align identified risks with organizational goals and objectives?

A

A risk assessment aligns each identified risk with the goals, objectives, assets, or processes that the organization uses, directly supporting the achievement of its goals and objectives.

47
Q

Give an example of a common risk assessment activity mentioned in the text.

A

A common risk assessment activity is identifying the risk of fire to a building.

48
Q

Explain the role of fire alarms in the context of a risk assessment for a building.

A

Fire alarms, while the lowest cost, play a role in alerting personnel to evacuate and reducing the risk of personal injury during a fire.

49
Q

How does the text describe the effectiveness of sprinkler systems in a risk assessment?

A

Sprinkler systems can minimize the amount of damage done by a fire, limiting its spread but not preventing it.

50
Q

In the context of a data center, how does the text describe the impact of sprinklers on systems and data?

A

While sprinklers in a data center limit the fire’s spread, they may destroy all the systems and data on them.

51
Q

What is mentioned as a potential best solution to protect systems in a risk assessment, but it may be cost-prohibitive?

A

A gas-based system is mentioned as a potential best solution to protect systems, but it might be cost-prohibitive.

52
Q

Explain the role of a risk assessment in prioritizing mitigation methods for identified risks.

A

A risk assessment prioritizes mitigation methods, helping management determine the most suitable method to protect assets based on the identified risks.

53
Q

What is the typical result of the risk assessment process, and who is it presented to?

A

The result is often documented as a report or presentation given to management, which is used for prioritizing the identified risks.

54
Q

Explain the concept of risk treatment in the context of risk management.

A

Risk treatment involves making decisions about the best actions to take regarding identified and prioritized risks.

55
Q

What factors influence the decisions made in risk treatment, as mentioned in the text?

A

The decisions in risk treatment are influenced by the management’s attitude toward risk and the availability and cost of risk mitigation.

56
Q

Define risk avoidance and provide an example of when an organization might choose this option.

A

Risk avoidance is attempting to eliminate the risk entirely. An example is ceasing operations for activities exposed to a high-risk level.

57
Q

What is risk acceptance, and under what circumstances might management choose this option?

A

Risk acceptance is taking no action to reduce the likelihood of a risk. Management may choose this when the impact or likelihood of occurrence is negligible, or the benefits offset the risk.

58
Q

Explain the practice of risk transference and provide a common example mentioned in the text.

A

Risk transference is passing the risk to another party in exchange for payment, typically through insurance policies.

59
Q

What is risk mitigation, and what are some common measures mentioned in the text?

A

Risk mitigation is the most common type of risk management, involving actions to prevent or reduce the possibility of a risk event or its impact. Common measures include security controls, policies, procedures, and standards.

60
Q

How does the text describe risk mitigation in the context of safety measures?

A

Risk mitigation, such as safety measures, should always be in place, even though risk cannot always be entirely mitigated.

61
Q

What is emphasized as the most common type of risk management in the text?

A

Risk mitigation is emphasized as the most common type of risk management.

62
Q

Describe a situation where an organization might opt for risk avoidance in risk treatment.

A

An organization might opt for risk avoidance when the potential impact of a given risk is too high or when the likelihood of the risk being realized is too great.

63
Q

What role does risk acceptance play in the context of risk treatment, especially when the benefits outweigh the associated risks?

A

Risk acceptance involves taking no action to reduce the likelihood of a risk, and it is chosen when the benefits offset the risk, or the impact or likelihood of occurrence is negligible.

64
Q

What is the significance of prioritizing and analyzing core risks in the context of risk management?

A

Prioritizing and analyzing core risks are essential to determine root causes, narrow down apparent risks, and establish a focused approach to risk management.

65
Q

How do security professionals typically conduct risk analysis, as mentioned in the text?

A

Security professionals work with their teams to conduct both qualitative and quantitative risk analysis.

66
Q

Why is understanding the organization’s overall mission and supporting functions crucial in risk prioritization?

A

Understanding the organization’s mission and supporting functions helps place risks in context, determine root causes, and prioritize the assessment and analysis of these items.

67
Q

What direction does management typically provide regarding the findings of a risk assessment?

A

In most cases, management provides direction for using the findings of the risk assessment to determine a prioritized set of risk-response actions.

68
Q

What is mentioned as an effective method to prioritize risk, and how does it work?

A

An effective method is using a risk matrix, which identifies priority as the intersection of the likelihood of occurrence and impact. It provides a common language to communicate priorities with management.

69
Q

Explain the concept of a risk matrix and how it aids in prioritizing risks.

A

A risk matrix helps identify priority by intersecting the likelihood of occurrence and impact, offering a common language to communicate priorities. For example, low likelihood and low impact result in low priority, while high likelihood and high impact result in high priority.

70
Q

How might a low likelihood and low impact incident be prioritized on a risk matrix?

A

A low likelihood and low impact incident might result in a low priority on a risk matrix.

71
Q

Provide an example of a situation that would result in a high priority on a risk matrix.

A

An incident with a high likelihood and high impact would result in a high priority on a risk matrix.

72
Q

What factors may influence the assignment of priority in risk management, according to the text?

A

Assignment of priority may relate to business priorities, the cost of mitigating a risk, or the potential for loss if an incident occurs.

73
Q

How does a risk matrix contribute to effective communication with management in determining final priorities?

A

A risk matrix provides a common language to communicate priorities by visually representing the intersection of likelihood and impact, making it easier for management to understand and make decisions.

74
Q

What factors must organizations evaluate when making decisions based on risk priorities?

A

Organizations must evaluate the likelihood and impact of the risk, along with their tolerance for different types of risk.

75
Q

How does the location of a company impact its risk priorities, as mentioned in the text?

A

The location of a company influences its risk priorities; for example, a company in Hawaii may be more concerned about volcanic eruptions, while a company in Chicago may need to plan for blizzards.

76
Q

Who is responsible for determining risk tolerance in an organization, according to the text?

A

Determining risk tolerance is up to the executive management and board of directors.

77
Q

Provide an example of how the risk priorities of a company in Hawaii might differ from a company in Chicago.

A

A company in Hawaii might be more concerned about the risk of volcanic eruptions, while a company in Chicago would need to plan for blizzards.

78
Q

What position does a company put itself in if it chooses to ignore or accept a significant risk, as mentioned in the text?

A

If a company chooses to ignore or accept significant risk, such as exposing workers to asbestos, it puts itself in a position of tremendous liability.

79
Q

Explain why determining risk tolerance is crucial for organizations in decision-making based on risk priorities.

A

Determining risk tolerance is crucial as it helps organizations set the boundaries for what types and levels of risk are acceptable, guiding decision-making and strategic planning.

80
Q

How might a company’s risk priorities impact its strategic planning and decision-making processes?

A

A company’s risk priorities influence its strategic planning and decision-making processes by directing attention and resources toward addressing and mitigating specific risks.

81
Q

Give an example of a specific risk that a company in Hawaii might prioritize, considering its location.

A

A company in Hawaii might prioritize the risk of volcanic eruptions due to the geographical characteristics of the region.

81
Q

In the context of risk priorities, what role do executive management and the board of directors play?

A

Executive management and the board of directors play a key role in determining risk tolerance and guiding decisions based on risk priorities.

82
Q

Why is it crucial for companies to plan for and address specific risks based on their location and environmental conditions?

A

Companies need to plan for and address specific risks based on location and environmental conditions to ensure the safety of personnel, protect assets, and mitigate the impact of potential incidents.

83
Q

What is risk tolerance, and how is it often likened to an entity’s attitude toward risk?

A

Risk tolerance is the perception management takes toward risk, often likened to the entity’s appetite for risk, indicating how much risk they are willing to take and whether they welcome or want to avoid it.

84
Q

What is usually the starting point for getting management to take action regarding risks?

A

Understanding the organization and senior management’s attitude toward risk is usually the starting point for getting management to take action regarding risks.

85
Q

Who determines the acceptable level of risk for an organization, and what role do security professionals play in this regard?

A

Executive management and/or the Board of Directors determine the acceptable level of risk for the organization. Security professionals aim to maintain risk levels within management’s limit of risk tolerance.

86
Q

Give an example of how risk tolerance can vary internally within an organization

A

Different departments within an organization may have different attitudes toward what is acceptable or unacceptable risk, showcasing internal variations in risk tolerance.

87
Q

How is risk tolerance often influenced by geographic location

A

Risk tolerance is often influenced by geographic location. For example, companies in Iceland plan for risks imposed by nearby volcanoes.

88
Q

How might the frequency of power outages differ based on geographic location, and how does it impact risk tolerance?

A

In areas where thunderstorms are common, power outages may occur more frequently than in other areas. The frequency of power outages influences a company’s risk tolerance.

89
Q

Explain how calculating downtime with varying lengths helps define a company’s risk tolerance.

A

Calculating downtime with varying lengths helps define a company’s risk tolerance by assessing the impact of potential power outages and determining how much downtime is acceptable.

90
Q

What measures might a company with a low tolerance for the risk of downtime take

A

A company with a low tolerance for the risk of downtime is more likely to invest in a generator to power critical systems.

91
Q
A