Chapter 2: Risk Management Flashcards

1
Q

Risk management

A

process of identifying and assessing risk, reducing it to an acceptable level, and ensuring it remains at that level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ISRM policy

A

information systems risk management policy; provides foundation/direction for the org’s security risk management processes and procedures and should address all issues of information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat

A

a potential cause of an unwanted incident, which may result in harm to a system or org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk assessment methodology

A

NIST SP 800-30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FRAP

A

Facilitated Risk Analysis Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OCTAVE

A

Operationally Critical Threat, Asset, and Vulnerability Evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FMEA

A

Failure Modes and Effect Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FMEA

A

Failure Modes and Effect Analysis; method for determining functions, identifying functional failures, and assessing the causes of failure and their effects through a structured process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fault tree analysis

A

a useful approach to detect failures which can take place within complex environments and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Quantitative risk analysis

A

attempts to assign monetary values to components within the analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Qualitative risk analysis

A

Uses judgment and intuition instead of numbers because qualitative items cannot be quantified with precision; involves people with requisite experience and education evaluating threat scenarios and rating the probability, potential loss, and severity of each threat based on their personal experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SLE

A

Single loss expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARO

A

annual rate of occurrence; frequency per year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ALE

A

annualized loss expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Annualized loss expectancy calculation

A

SLE x ARO = ALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk treatments

A

transferred, avoided, reduced, or accepted

17
Q

Total risk calculation

A

Threats x vulnerability x asset value = total risk

18
Q

Residual risk calculation

A

(Threats x vulnerability x asset value) x controls gap = residual risk

19
Q

Three categories of controls

A

administrative technical, and physical

20
Q

Types of controls (depending on their purpose)

A

Preventive, detective, corrective, deterrent, recovery, and compensating

21
Q

Security control verification

A

“did we implement the control right?”

22
Q

Security control validation

A

“did we implement the right control?”

23
Q

Supply chain

A

sequence of suppliers involved in delivering some product

24
Q

BCM

A

business continuity management; overarching approach to managing all aspects of BCP and DRP

25
Q

BCP

A

business continuity plan; strategy documents which detail procedures to ensure critical business functions are maintained and help minimize losses of life, operations, and systems

26
Q

BCP contents

A

provides procedures for emergency responses, extended backup operations, and post-disaster recovery. Should have enterprise-wide reach, with each individual org having its own detailed continuity and contingency plans. Needs to prioritize critical apps and provide a sequence for efficient recovery. Requires senior executive management support for initiating the plan and final approval; can quickly become outdated due to personnel turnover, reorganizations, and undocumented changes