Chapter 8 Using Risk Management Tools Flashcards
___ is the likelihood that a threat will exploit a vulnerability
Risk
A _____ is a weakness
Vulnerability
A ____ is a potential danger
Threat
____ refers to the magnitude of harm that can be caused if a threat exercises a vulnerability
Impact
A system without up-to-date antivirus software is vulnerable to ______
Malware
Malware written by malicious attackers is the ______
Threat
The likelihood that the malware will reach a vulnerable system represents the ____
Risk
Within the context of risk management, a ____ is any circumstance or event that can compromise the confidentiality, integrity, or availability of data or a system
Threat
List different forms of threats
Malicious human threats - script kiddies, apts, network, system, malware attacks
Accidental human threats - accidentally delete or corrupt data, or accidentally access data they shouldn’t. Unintentionally cause outages.
Environmental threats - Power failure, mother nature
A _____ ____ helps an organization identify and categorize threats.
Threat assessment
Organizations have limited ____ so it’s not possible to protect against all threats.
Resources
List some common types of threat assessments
Environmental - evaluates the likelihood of an environmental threat occurring.
Manmade - evaluates all threats from humans
Internal - evaluates threats from within an organization. Threats from malicious employees and accidents
External - evaluates threats from outside an organization. External attackers and natural threats
A ___ is a flaw or a weakness in software or hardware, or a weakness in a process that a threat could exploit, resulting in a security breach.
Vulnerability
List some examples of vulnerabilities
Lack of updates - not up to date on patches, hotfixes, and service packs
Default configurations - hardening includes changing systems from their default hw and sw configurations, including changing default usernames and passwords
Lack of malware protection or updated definitions
Lack of firewalls
Lack of organizational policies
___ _____ is the practice of identifying, monitoring, and limiting risks to a manageable level.
Risk management
True or False Risk management eliminates risks
False. It identifies methods to limit or mitigate them.
The amount of risk that remains after managing risk is ____ ___
Residual risk
True or False: The primary goal of risk management is not to reduce risk to a level that the organization will accept.
False it IS to reduce risk to a level that the organization will accept
_______ must choose a level of acceptable risk based on their organizational goals.
Management
List some risk response techniques
Avoid - by not providing a service or not participating in a risky activity.
Transfer - to another entity i.e. purchasing insurance or outsourcing
Mitigate - implement controls to reduce risk i.e. up to date antivirus software
Accept - when the cost of a control outweighs a risk, an organization will often accept the risk
A ____ ____/____ is an important task in risk management
Risk assessment/analysis
True or False: Risk assessment quantifies/qualifies risks based on different values or judgments
True
What does a risk assessment first identify?
Assets and asset values
An ____ includes any product, system, resource, or process that an organization values.
Asset