IT Risk and Risk Assessment Flashcards
Confidentiality
Only authorized individuals, processes or systems should have access to information on a need to know basis
Integrity
Information should be protected from intentional, unauthorized or accidental changes
Availability
Information or service must be available when and where needed
Accountability
All actions must be associated with a discrete entity performing said action
Risk Responses (OMATA)
- Ownership
- Mitigation
- Avoidance
4, Transfer - Acceptance
Ways to reduce workforce risks
- Job Rotation
- Separation of Duties
- Least Privilege (need-to-know)
- Mandatory Vacations
- Employee Termination
- Vendor, Consultant, and Contractor Controls
Risk Assessment Process
- Prepare
- Conduct
- Communicate
- Maintain
Annual Loss Expectancy (ALE)
Gives a measure of the expected annual loss due to a vulnerability
ALE = ARO * SLE
Core Information Security Principles
- Confidentiality
- Integrity
- Availability
- Accountability
Annual Rate of Occurrence (ARO)
Estimate of how often a threat will be successful in exploiting a vulnerability over a period of 1 year
Single Loss Expectancy (SLE)
Difference between original value and remaining value of an asset after a single exploit
SLE = asset value ($) * exposure value (%)
Responsibility of Data/Information/Business Owners
Responsible for information asset (assigns data classification, ensures protection of data with controls)
Responsibility of Data Custodian
Individual or function taking care of the information on behalf of the data owner
Responsible for availability of data, backup, and recovery
Risk Management Process
- Framing
- Assessing
- Responding
- Monitoring
Risk Assessment
Process of identifying, estimating, and prioritizing information security risks
Can be qualitative or quantitative