Chapter 5.3 Flashcards

1
Q

risk register

A

is a document showing the results of a risk assessment in a comprehensible format. Risk registers are commonly depicted as scatterplot graphs, where impact and likelihood represent each axis, and the plot point is associated with a legend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

risk assessment

A

evaluates the likelihood and impact (or consequence) of a threat actor exercising a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk management

A

involves mitigation (or remediation) and the overall process of reducing exposure to the effects of risk factors. Risk management can involve change management processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk transference

A

(or sharing) means assigning risk to a third-party (such as an insurance company). Contracting a third-party to handle business processes such as quality assurance is also a form of transference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SLE

A

Single Loss Expectancy (SLE) is the amount that would be lost in a single occurrence of the risk factor. This is determined by multiplying the value of the asset by an Exposure Factor (EF).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ALE

A

Annual Loss Expectancy (ALE) is the amount that would be lost over the course of a year. This is determined by multiplying the SLE by the Annual Rate of Occurrence (ARO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARO

A

Annual Rate of Occurrence (ARO) represents the frequency of failures for an entity and is used to gain the Annual Loss Expectancy (ALE).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MTTF

A

Mean time to failure (MTTF) is the average time a device or component is expected to be in healthy operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

environment

A

is caused by a failure in the surroundings. This includes power or telecoms failure, pollution, or accidental damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

manmade

A

is an intentional or unintentional incident caused by a person. This includes terrorism, war, errors, and even social media issues. An automobile striking a pole is an unintentional incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

natural

A

Severe storms and heavy rains that cause flooding are considered to be elements of a natural disaster. Earthquakes and tornados are also examples of natural disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

change management

A

is a process that should be carefully planned, with consideration for how dependent components are impacted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

COOP

A

Continuity of Operations (COOP) is a collection of processes that enable an organization to maintain normal business operations in the face of some adverse event. Fault tolerance through redundancy of critical hardware and systems is such a process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Elasticity

A

Elasticity refers to refers to a system’s ability to handle changes in demand in real time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Legal and commercial

A

events include downloading or distributing of obscene material, defamatory comments published on social networking sites, or hijacked mail or web servers used for spam or phishing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

proactive

A

When a change is requested, it is best to use a formal process. With a proactive approach, a change management process is initiated internally to an organization. Change is usually for improvements.

17
Q

reactive

A

When a change is reactive, it is driven by external forces. In this case, the device had not yet been released to market. Had consumers discovered and reported the vulnerability, it would have been a reactive process.

18
Q

avoidance

A

Avoidance is the act of stopping a risk-bearing activity and not related to change management. For example, removing a faulty product from the market is a strategy employed to avoid risk.

19
Q

transference

A

Transference is the act of sharing or moving the risk to another party and is not related to change management. Insurance policies and utilizing third parties for services are examples of transference of risk.

20
Q

risk

A

is the likelihood and impact (or consequence) of a threat actor exercising a vulnerability.

21
Q

threat

A

A threat is the potential for an entity to exercise a vulnerability (that is, to breach security). Likelihood is the probability of a threat being realized, which is a variable used in a risk assessment.

22
Q

recovery

A

Recovery is not an action that is assessed with likelihood although it is certainly a topic for discussion during lessons learned. Recovery relates to bringing systems back online.

23
Q

controls

A

Controls are assessed in a security assessment and are not related to likelihood. Controls are put in place to prevent a security related incident.

24
Q

quantitative risk assessment

A

A quantitative risk assessment is used in assessing likelihood and risk. This method aims to assign concrete values to each risk factor and uses Single Loss Expectancy (SLE) and Annual Loss Expectancy (ALE) metrics.

25
Q

qualitative risk assessment

A

A qualitative risk assessment is used in assessing likelihood and risk. The qualitative approach seeks out people’s opinions of significant risk factors.

26
Q

asset

A

An asset value is used to find the exposure factor. The problem with quantitative risk assessment is that the process of determining and assigning such a value is extremely complex and time consuming, particularly if no historical data is present.

27
Q

MTD

A

Maximum Tolerable Downtime (MTD) is the longest period of time that a business function outage may occur for without causing irrecoverable business failure.

28
Q

likelihood

A

Likelihood is the probability of a threat being realized. If certain data is known to be valuable, threat likelihood may be very high.

29
Q

Impact

A

Impact is the severity of the risk if realized as a security incident. This may be determined by factors such as the value of the asset, or the cost of disruption if the asset is compromised.