CPP 2022 Domain 1 Security Principles and Practices Flashcards
What is Enterprise Security Risk Management (ESRM)?
ESRM is a strategic approach to security management that ties an organization’s security practice to its overall strategy using globally accepted and established risk management principles.
Source: POA, Security Management, 1.1.2, page 2
What are the three primary components of ESRM?
The context,The foundation,The ESRM cycle.
Source: POA, Security Management, 1.2, page 6
This component of ESRM includes organizational aspects that security professionals must understand to successfully adopt ESRM.
The context.
Source: POA, Security Management, 1.2, page 6
This component of ESRM includes organizational concepts that support the ESRM approach and maximize its impact.
The foundation.
Source: POA, Security Management, 1.2, page 6
This component of ESRM is the actual process of security risk management that emphasizes the importance of understanding assets.
The ESRM cycle.
Source: POA, Security Management, 1.2, page 6
What organizational aspects are included in the context of ESRM?
Mission and vision, Core values, Operating Environment, Stakeholders.
Source: POA, Security Management, 1.2.1, pages 6-10
What three things comprise the operating environment of an organization?
Physical, Non physical, Logical.
Source: POA, Security Management, 1.2.1, page 8
This operating environment includes much of what influences traditional security factors, such as the type and location of buildings, industrial control systems, and products on hand.
Physical.
Source: POA, Security Management, 1.2.1, page 8
These factors are sources of risk, and include things such as the geopolitical environment, intensity of competition, and speed required for decision making.
Non physical factors.
Source: POA, Security Management, 1.2.1, page 9
These factors focus on information types such as servers, workstations, and network infrastructure.
Logical factors.
Source: POA, Security Management, 1.2.1, page 9
What are the four processes in the ESRM cycle?
Identify and prioritize assets, Identify and prioritize risks, Mitigate prioritized risks, Continuous improvement.
Source: POA, Security Management, 1.2.2, page 12
What is an asset owner?
The person most directly responsible for successful operation of the asset. In ESRM, the asset owner is assigned responsibility for the risk to an asset.
Source: POA, Security Management, 1.2.2, page 13
What four concepts comprise the foundation of ESRM?
Holistic risk management, Partnership with stakeholders, Transparency, Governance.
Source: POA, Security Management, 1.2.3, page 14
What are two types of assets?
Tangible, Intangible.
Source: POA, Security Management, 2.1.1, page 22
What are four ways to manage risk?
Eliminate, Reduce, Transfer, Accept.
Source: POA, Security Management, 2.2.1, page 26
This risk mitigation strategy involves removing the risk entirely.
Eliminate.
Source: POA, Security Management, 2.2.1, page 26
This risk mitigation strategy attempts to minimize risk through protective measures.
Reduce.
Source: POA, Security Management, 2.2.1, page 26
This risk mitigation strategy is typically achieved when another entity takes the risk on the organization’s behalf.
Transfer.
Source: POA, Security Management, 2.2.1, page 26
This risk mitigation strategy allows risk if the costs of reducing, eliminating, or transferring the risk outweigh the potential losses associated with it.
Accept.
Source: POA, Security Management, 2.2.1, page 26
What is a risk assessment?
Risk assessment is the identification, analysis, and evaluation of uncertainties to objectives and outcomes. It provides a comparison between the desired/undesired outcomes and expected rewards/losses of organizational objectives. The risk assessment analyzes whether the uncertainty is within acceptable boundaries and within the organization’s capacity to manage risk.
Source: Risk Assessment Standard, 0.2, page xvi
What do the results of a risk assessment inform?
The choices available to effectively manage risk to achieve the organization’s outcomes.
Source: Risk Assessment Standard, 0.2, page xvi
What are the deciding factors between a qualitative or quantitative approach to a risk assessment?
The reliability and validity of the available data, The nature of the risk factors and if they are quantifiable, The target audience for the outputs.
Source: Risk Assessment Standard, 0.3, page xvii
What is risk appetite?
The total exposed amount that an organization wishes to undertake on the basis of risk-return trade-offs for one of more desired and expected outcomes.
Source: Risk Assessment Standard, 3.41, page 5
What tasks take place at the start of the risk assessment?
Setting objectives, Identification of stakeholders, Identification of internal context and variables, documenting assumptions, Defining scope and statement of work, Policy and management commitment, Commitment of resources.
Source: Risk Assessment Standard, 6.2, pages 40-45
What is a gap analysis?
A technique to determine what steps might need to be taken to improve from a current state to a desired, future state.
Source: Risk Assessment Standard, 6.3.1, page 45
A gap analysis consists of what three steps?
Noting currently available factors, listing success factors needed to achieve future, desired objectives, Highlighting the gaps that exist and what gaps may need to be filled to be successful.
Source: Risk Assessment Standard, 6.3.1, page 46
What four components should be in any risk identification process, regardless of risk discipline?
Asset and service identification, valuation, and characterization, Threat and opportunity analysis, Vulnerability and capability analysis, Criticality and impact analysis.
Source: Risk Assessment Standard, 6.4.4.1, page 60
What is risk tolerance?
The amount of uncertainty an organization is prepared to accept in total or more narrowly within a certain business unity, a particular risk category, or for a specific initiative.
Source: Risk Assessment Standard, 3.51, page 6
What comprises assessor competence?
Personal traits and interpersonal skills, Assessment skills, Communication skills, Education, training, and knowledge, Work experience.
Source: Risk Assessment Standard, 7.1, page 82
Documented criteria of an assessor’s knowledge and skills provide the basis for what three things?
Selection of assessment team members, ascertain competence enhancement required for continuous improvement, Determine performance indicators for assessors.
Source: Risk Assessment Standard, 7.2.2, page 83
What are two types of interactions between a risk assessment team and an organization?
Human interaction, Minimal human interactions.
Source: Risk Assessment Standard, A.2, page 88
This type of interaction includes activities such as conducting interviews, document reviews with stakeholders, exercises, and undercover investigations.
Human interaction.
Source: Risk Assessment Standard, A.2, page 88
This type of interaction includes activities such as conducting a document review, physical examination, observation, and sampling.
Minimal human interaction.
Source: Risk Assessment Standard, A.2, pages 88-89
What are two examples of assessment paths?
Tracing, Process method.
Source: Risk Assessment Standard, A.3, page 89
This assessment path tracks a process or risk event chronologically, following a path forward or backward through a process or sequence.
Tracing.
Source: Risk Assessment Standard, A.3, page 89
This assessment path tests a sequence of steps and evaluates process controls, interactions, effectiveness, and opportunities for improvement.
Process method.
Source: Risk Assessment Standard, A.3, page 89
What are some examples of the process method?
Objectives method, Risk source method, Department method, Requirement method, Discovery method.
Source: Risk Assessment Standard, A.3, page 89
What is sampling?
The process or technique of selecting a representative part of a population for the purpose.
Source: Risk Assessment Standard, A.4.1, page 89
When is it beneficial to use a sampling method?
When it is not practical in time or cost terms to evaluate all available information.
Source: Risk Assessment Standard, A.4.1, page 89
What are two types of sampling methods?
Non-statistical, Statistical.
Source: Risk Assessment Standard, A.4.2, page 91
This sampling method includes judgmental sampling, convenience sampling, and haphazard sampling.
Non-statistical.
Source: Risk Assessment Standard, A.4.3, page 91
This sampling method includes random sampling, systematic sampling, stratified sampling, and cluster/block sampling.
Statistical sampling.
Source: Risk Assessment Standard, A.4.2, pages 91-92
What is terrorism?
An act of violence designed to achieve a political end.
Source: POA, Security Management, 12.3.1, page 195
What is domestic terrorism?
Violent, criminal acts committed by individuals and/or groups to further ideological goals stemming from domestic influences, such as those of a political, religious, social, racial, or environmental nature.
Source: POA, Security Management, 12.3.1, page 196