Chapter 3 Review Flashcards
Chapter 3 Review
When implementing this program, the organization must consider several characteristics;
1. Risk tolerance
2. Management Structure
3. Executive Management Support
4. Culture
5. Regulatory and Legal obligations
RISK MANAGEMENT PROGRAM
Chapter 3 Review
When implementing a risk management program, the organisation must consider the characterstics of the following 5 things;
- ____ ; Senior Management contentness with deviation from risk appetite
- ____ ; How many managers, and their business unit alignments
- ____ ; How well the program is endorsed
- ____ ; Attitudes within the business
- ____ ; Mandated committments
- RISK TOLERANCE
- MANAGEMENT STRUCTURE
- EXEC MANAGEMENT SUPPORT
- CULTURE
- REGULATORY and LEGAL OBLIGATIONS
Chapter 3 Review
A risk management program should include several avenues of this so that business leaders and stakeholders understand the program and how it is integrated into the organization.
COMMUNICATION
Chapter 3 Review
The risk management program should be transparent with regard to these 2 things
PROCEDURES and PRACTICES
Chapter 3 Review
When building or improving a risk management program, security managers may select one of several industry frameworks, such as:
- ISO/IEC ____
- ISO/IEC ____
- ISO/IEC ____
- NIST SP 800-____
- NIST SP 800-____
- C____
- R____ I ____
- R____
- F____
- ISO/IEC 27001
- ISO/IEC 27005
- ISO/IEC 31010
- NIST SP 800-37
- NIST SP 800-39
- COBIT
- Risk IT
- RIMS
- FAIR
Chapter 3 Review
Risk management program frameworks offer these 7 similar components to each other
- S____ ; What is covered
- O____ ; Desired targets
- P____ ; Governance
- R____ ; Senior Mgmt contentness with deviation from risk appetite
- R____ ; Definining ownership and what personnel must do
- R____ ; A Lifecycle process
- M____ ; An analysis by leaders
- SCOPE
- OBJECTIVES
- POLICY
- RISK TOLERANCE
- ROLES and RESPONSIBILITIES
- RISK MANAGEMENT LIFE-CYCLE
- MANAGEMENT REVIEW
Chapter 3 Review
To the greatest reasonable extent, a risk management program should be integrated into the business to avoid causing this to the organization whilst also achieving this in regards to risk
DISRUPTION
MINIMIZING RISK
Chapter 3 Review
When planning a risk management program, the security manager and executive leadership need to understand and this in regards to why the program has been put in place
CONTEXT
This includes the program’s scope, participants and stakeholders, and risk tolerance.
Chapter 3 Review
This person must consider many aspects of the organization’s internal and external environments such as;
- Market and Economic Conditions
- External Stakeholders
- Customers
- External Threats
SECURITY MANAGER
Chapter 3 Review
The security manager must consider these 4 aspects in regards to the internal and external environments when devloping a risk management program;
- ____ ; Environment in which the business is operating
- ____ ; Third party people who have an investment in the business
- ____ ; People to whom the business exists to serve
- ____ ; Actors or events outside of the business that serve to cause harm
- MARKET and ECONOMIC CONDITIONS
- EXTERNAL STAKEHOLDERS
- CUSTOMERS
- EXTERNAL THREATS
Chapter 3 Review
The security manager may need to perform a one of these to better understand the current state as compared to the desired future state of the program.
GAP ANALYSIS
Chapter 3 Review
Security managers can fill gaps in these 2 areas of their understanding through networking with other security and risk professionals, training, periodicals, and conferences.
KNOWLEDGE and EXPERIENCE
Chapter 3 Review
The risk management life cycle consists of a set of activities that enable the organisation to to these 2 things in relation to risk.
DISCOVER and MANAGEMENT
Chapter 3 Review
These are the 6 steps in the risk management life cycle process;
- S____ ; Defining what the program covers
- A____ ; Discovering information/information systems and their worth
- Risk I____ ; What are the risks
- Risk A____ ; Determine the threat, likliehood and impacts of the risks
- Risk T____ ; Determine remediation activities
- Risk C____ ; Tell people about the risks
- SCOPE DEFINITION
- ASSET IDENTIFICATION and VALUATION
- RISK IDENTIFCATION
- RISK ANALYSIS
- RISK TREATMENT
- RISK COMMUNICATION
Chapter 3 Review
Carrying these out on a periodic basis contribute to continued risk identification.
RISK ASSESSMENTS
Chapter 3 Review
A key step in risk analysis is the identification of vulnerabilities, or weaknesses, in these 3 areas
- P____ ; Individuals
- B____ P ____ ; Methodologies
- T____ ; Hardware or software
- PEOPLE
- BUSINESS PROCESSES
- TECHNOLOGY
Chapter 3 Review
A key step in risk analysis is the identification and analysis of these 2 threats
INTERNAL and EXTERNAL
Chapter 3 Review
Security managers need to recognize that these things often need to be considered in a risk assessment, and some may not yet be included in current standards.
EMERGING THREATS
Chapter 3 Review
After risks are identified, the amount of risk present can be calculated using input from these 5 areas;
- T____ ; Events that could cause harm
- T____ A ____ ; Individuals or groups that could cause harm
- V____ ; Weaknesses in systems or processes
- A____ V ____ ; Worth of Information/Information systems
- I____ ; Ramifications of events occurring
- THREATS
- THREAT ACTORS
- VULNERABILITES
- ASSET VALUE
- IMPACT
Chapter 3 Review
In most cases, risk is calculated in this way to provide an easy to understand evaluation of the risk
QUALITATIVE
primarily because it is difficult to know the precise (or even an approximate) probability of threat occurrence and somewhat difficult to know the financial impact of a threat.
Chapter 3 Review
In quantitative risk analysis, key values are;
- (AV)
- (EF)
- (SLE)
- (ARO)
- (ALE)
- ASSET VALUE (AV)
- EXPOSURE FACTOR (EF)
- SINGLE LOSS EXPECTANCY (SLE)
- ANNUALISED RATE OF OCCRRENCE (ARO)
- ANNUALISED LOSS EXPECTANCY (ALE)
Chapter 3 Review
RISK = T____ x V ____
RISK = THREATS x VULNERABILITIES
RISK = THREATS x VULNERABILITIES x ASSET VALUE
RISK = THREATS x VULNERABILITIES x PROABILITY
Chapter 3 Review
Industry-standard techniques are available for performing risk analysis, including
- O____
- B____ T ____ Analysis
- D____ Method
- B____ Analysis
- E____ T ____ Analysis
- F____ T ____ Analysis
- M____ C ____ Analysis
- OCTAVE ALLEGRO
- BOW TIE ANALYSIS
- DELPHI METHOD
- BAYESIAN ANALYSIS
- EVENT TREE ANALYSIS
- FAULT TREE ANALYSIS
- MONTE CARLO ANALYSIS
Delph climbed a tree in Monte Carlo bay with his 8 pokka dot bow tie on
Chapter 3 Review
Risks identified in a risk assessment or risk analysis needs these 4 activities performing;
- E____ ; Assessed
- R____ ; Scored against a matrix
- C____ ; Placed into a corresponding grouping
- A____ ; Responsibility appointed to an individual
- EVALUATED
- RANKED
- CATEGORIZED
- ASSIGNED A RISK OWNER
Chapter 3 Review
An organization will enact these to address a risk.
CONTROLS
Chapter 3 Review
Risk management and this program have several common components and linkages.
BUSINESS CONTINUITY PLANNING
Chapter 3 Review
Risk Management and Business Continuity Planning both are concerned with these 2 areas, and both utilize business impact analysis to better understand the organization’s most critical processes.
BUSINESS RESILIENCE and SURVIVAL
Chapter 3 Review
Risk Management and Business Continuity Planning both are concerned with business resilience and survival, and both utilize this method to better understand the organization’s most critical processes.
BUSINESS IMPACT ANALYSIS
Chapter 3 Review
This tool is the central business record in a risk management program.
RISK REGISTER
Chapter 3 Review
A risk register is a catalog of all current and historical risks, along with many pieces of metadata describing what in relation to risk.
EACH RISK IN DETAIL
Chapter 3 Review
A risk register may be stored in a
- S____
- D____
- G____
- SPREADSHEET
- DATABASE
- GRC TOOL
Chapter 3 Review
____ and ____ are incorporated into many other business activities, including but not limited to;
- software development
- change management
- configuration management
- incident and problem management
- physical security
- enterprise risk management
- human resource management
SECURITY and RISK MANAGEMENT
Chapter 3 Review
This program is established to close the gap between the existing state of controls, as identified by a risk assessment, and the desired state, which will be obtained through meeting control objectives
INFORMATION SECURITY PROGRAM
Most standard frameworks for information security show the development of an information security program as starting with a risk assessment and control objectives