Chapter 4 Flashcards

1
Q

Define risk management

A

Analyzing a risk to quantify the potential for losses in a specific investment and to decide what is the appropriate action to take

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define loss exposure

A

A situation or physical circumstance that makes an individual or an organization vulnerable to loss, damage, or injury and will lead to financial loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define enterprise risk management

A

An approach to managing all of an organizations key business risks and opportunities with the intent of maximizing shareholders value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four main areas in ERM framework?

A

Strategy
Governance and culture
Operating model
Data and technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain strategy in the ERM framework

A

Includes profitability and growth, and how the company is going to meet those expectations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain governance and culture in ERM framework

A

Establishes the internal systems and processes that ensure a company functions effectively. It also provides oversight and establishes how decisions are made in a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain operating model in ERM framework

A

Standardized systems and processes allow a company to respond quickly and effectively to potential competitive or strategic risks. This area considers how a company manages its operational risks holistically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define risk control

A

Actions taken to identify potential losses and devise strategies to reduce the risks or eliminate them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain pre- and post-loss planning

A

-Organizations that plan for cyber attacks are the most resilient after these events occur
-Putting together a cyber plan includes determining who will be assigned specific responsibilities in the event of a breach, creating a written plan, and practising the plan
-Being prepared significantly reduces the time from when the breach is detected to when the company is back up and running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Under PIPEDA and the Digital Privacy Act, who is found responsible in the case of a cyber attack and a third party service provider is involved?

A

The company

Even if IT is outsourced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some network security control options?

A

Firewalls
Antivirus software
Intrusive detection systems/intrusion prevention systems
Data loss prevention software
Encryption on devices, both at rest and in transit
Access control procedures
Patch management policies
Network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the main steps in risk management process?

A

-Identify and analyzing exposures- human perils, natural perils, economic perils
-Formulating options- reducing, eliminating, assuming, retaining, or transferring risk
-Selecting the best technique- selection is unique to each organization
-Implementing the risk management plan- including a plan to implement the risk control program
-Monitoring results and modifying the plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly