Chapter 2 Flashcards
What are the three approaches to performing a security survey?
Outside-In Approach, Inside-Out Approach, Functional (Security Discipline) Approach
What is a SWOT Analysis used for in the security survey process?
To focus on Strengths, Weaknesses, Opportunities, and Threats.
How can outside support like consultants benefit the risk assessment process?
By providing a fresh perspective, collective knowledge, and regulatory compliance assistance.
What tests should be considered during the security survey process?
Shipping and receiving controls, intrusion detection alarms, computer lab security, access controls.
What criteria should the security survey report adhere to?
Accurate, clear, concise, timely, considerate of slant or pitch.
What is the goal of a security survey in relation to leadership?
To provide actionable intelligence for informed decision-making regarding risk.
How can automated assessment tools assist in security surveys?
By processing, analyzing, comparing, and storing large amounts of data efficiently.
Define risk management.
Risk management is the systematic approach of identifying, calculating, and minimizing risks to an acceptable level.
What is the main objective of security?
The main objective of security is to manage risks by balancing protection measure costs with benefits.
What are the three categories in which assets can be divided?
Tangible assets, intangible assets, and mixed assets.
How can assets be valued?
Assets can be valued using relative value based on priority or the Cost-of-Loss Formula.
What does the basic Cost-of-Loss Formula consist of?
The Cost-of-Loss Formula consists of Cp, Ct, Cr, Ci, and I, yielding the total cost of loss.
What is one method to prioritize assets based on security risk?
Security risk can be calculated and used to rank or prioritize each asset.
How many steps are involved in the risk assessment process?
The risk assessment process involves six basic steps.
What are the initial steps in the risk assessment process?
The initial steps include identifying and valuing assets, identifying threats, and determining vulnerabilities.
What is the goal of risk management programs in organizations?
The goal is to develop a comprehensive protection strategy based on sound practices.
What formula is used to determine risk results?
Threat x Vulnerability x Impact /3 = Risk
Why is multiplication used instead of addition in the Risk Formula?
To determine the value; each element is scaled from 0-100.
How is overall risk placed back on a 0 to 100 scale?
By using the cubed root in the risk formula.
What is the goal of risk analysis?
To provide management with decision-making information.
Why is it important to prioritize risk based on criticality?
Because it is not practical to eliminate all risk.
What should be considered when determining protective measures?
Budgetary constraints, available resources, and adverse effects.