Chapter 17 - Risk Management and Privacy Flashcards
Enterprise Risk Management (ERM)
Enterprise Risk Management programs have organizations take a formal approach to risk analysis that begins with identifying risks, continues with determining the severity of each risk, and then results in adopting one or more risk management strategies to address each risk.
Threats
Threats are any possible events that might have an adverse impact on the confidentiality, integrity, and/or availability of our information or information systems.
Vulnerabilities
Vulnerabilities are weaknesses in our systems or controls that could be exploited by a threat.
Risks
Risks occur at the intersection of a vulnerability and a threat that might exploit that vulnerability. A threat without a corresponding vulnerability does not pose a Risk, nor vice versa.
Risk Identification Process
The Risk Identification Process requires identifying the threats and vulnerabilities that exist in your operating environment.
External Risks
External Risks are those risks that originate from a source outside the organization. This is an extremely broad category of risk, including cybersecurity adversaries, malicious code, and natural disasters, among many other types of risk.
Internal Risks
Internal Risks are those risks that originate from within the organization. They include malicious insiders, mistakes made by authorized users, equipment failures, and similar risks.
Multiparty Risks
Multiparty Risks are those that impact more than one organization. For example, a power outage to a city block affects all the buildings on that block. Similarly, the compromise of an SaaS provider’s database is a multiparty risk because it compromises the information of many different customers of the SaaS provider.
Legacy Systems
Legacy Systems pose a unique type of risk to organizations. These outdated systems often do not receive security updates and cybersecurity professionals must take extraordinary measures to protect them against unpatchable vulnerabilities.
Intellectual Property (IP) Theft
Intellectual Property (IP) Theft risks occur when a company possesses trade secrets or other proprietary information that, if disclosed, could compromise the organization’s business advantage.
Software Compliance/Licensing Risks
Software Compliance/Licensing Risks occur when an organization licenses software from a vendor and intentionally or accidentally runs afoul of usage limitations that expose the customer to financial and legal risk.
Likelihood of Occurrence/Probability
Likelihood of Occurrence refers to the chances of the risk actually occurring. This could be expressed as the percent of chance that a threat will exploit a vulnerability over a specified period of time.
Impact
In risk assessment, Impact refers to the gravity of the effects that the risk would have on the organization if it did occur. This is often expressed as a financial cost.
Risk Severity Formula
Risk Severity = Likelihood * Impact
Continuous Risk Assessments
Continuous Risk Assessments involve ongoing monitoring and analysis of risks. This can include automated systems that constantly scan for new threats or changes in the risk environment, as well as regular reviews and updates to the risk management strategy.