information security Flashcards
Risk Appetite
Before the organization can or should proceed, it needs to
understand whether the current level of controls identified at
the end of the risk assessment process results in a level of risk
management it can accept
risk tolerance
The risk tolerance (or risk threshold) works hand in glove with
risk appetite, as it more clearly defines the range of acceptable
risk for each initiative, plan, or activity
6
Residual Risk
The residual risk is the amount of risk or danger associated with an action or event remaining after natural or inherent risks have been reduced by risk controls.
Risk Treatment/Response Options
- Mitigation: Involves the implementation of some solution that will reduce an identified risk.
- Transfer: Shift risk to another entity (some or all of the risk is being
transferred to some external entity) - Avoidance: the organization abandons the risk-inducing activity altogether,
effectively taking the asset out of service or discontinuing the
activity so the risk is no longer present. - Acceptance: Management may be willing to accept an identified risk as is, with no effort to reduce it.
Other Factors Impacting Response
Balancing Risk and Reward to maximize profits
Organizational Design
Organizational Culture
Residual Risk
Legal and Regulatory
Feasibility and Cost Benefit Analysis
Before deciding on the strategy for a specific asset-vulnerability-
threat combination, all readily accessible information about the
consequences of the vulnerability must be explored
Cost Benefit Analysis (CBA)
The criterion most commonly used when evaluating a project that
implements InfoSec controls and safeguards is economic
feasibility
Organizations can begin this type of economic feasibility analysis
by valuing the information assets and determining the loss in
value if those information assets became compromised
Cost and benefit Analysis (CBA)
cost: Just as it is difficult to determine the value of information, it is
difficult to determine the cost of safeguarding it
benefit: Benefit is the value to the organization of using controls to prevent
losses associated with a specific vulnerability
Other Methods of Establishing Feasibility
Organizational feasibility
Operational feasibility
Technical feasibility
Political feasibility
Importance of Risk and Control Ownership
Ongoing activities, including control effectiveness assessments
and risk assessments, used to observe changes in risk. Security
managers perform risk monitoring to report risk levels to
executive management and to identify unexpected changes in
risk levels.
Key Risk Indicators
Training and Awareness
Risk Documentation
Knowing yourself and knowing your enemy
if you know your enemy and yourself, you need not fear the result of a hundred battles. if you know yourself but not the enemy. for every victory gained you will also suffer a defeat (failure). if you know neither the enemy nor yourself, you will succumb (secome/تسلیم شدن) in every battle.
Asset (اَسِت )دارائی Identification
information system ocmponenets: People , procedures, data, software, hardware, netwroking
Identifying Hardware, Software, and Network Assets
Many organizations use asset inventory systems to keep track of
their hardware, network, and software components
Determine which attributes of each of these information assets
should be tracked
Identifying People, Procedures and Data Assets
Responsibility for identifying, describing, and evaluating these
information assets should be assigned to managers who possess
the necessary knowledge, experience, and judgment
Assessing Values for Information Assets
As each information asset is identified, categorized, and
classified, a relative value must be assigned
Relative values are comparative judgments made to ensure that
the most valuable information assets are given the highest priority.