IT Risk and Risk Assessment Flashcards

1
Q

Confidentiality

A

Only authorized individuals, processes or systems should have access to information on a need to know basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Information should be protected from intentional, unauthorized or accidental changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Information or service must be available when and where needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accountability

A

All actions must be associated with a discrete entity performing said action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk Responses (OMATA)

A
  1. Ownership
  2. Mitigation
  3. Avoidance
    4, Transfer
  4. Acceptance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ways to reduce workforce risks

A
  1. Job Rotation
  2. Separation of Duties
  3. Least Privilege (need-to-know)
  4. Mandatory Vacations
  5. Employee Termination
  6. Vendor, Consultant, and Contractor Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Assessment Process

A
  1. Prepare
  2. Conduct
  3. Communicate
  4. Maintain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Annual Loss Expectancy (ALE)

A

Gives a measure of the expected annual loss due to a vulnerability
ALE = ARO * SLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Core Information Security Principles

A
  1. Confidentiality
  2. Integrity
  3. Availability
  4. Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Annual Rate of Occurrence (ARO)

A

Estimate of how often a threat will be successful in exploiting a vulnerability over a period of 1 year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Single Loss Expectancy (SLE)

A

Difference between original value and remaining value of an asset after a single exploit
SLE = asset value ($) * exposure value (%)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Responsibility of Data/Information/Business Owners

A

Responsible for information asset (assigns data classification, ensures protection of data with controls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Responsibility of Data Custodian

A

Individual or function taking care of the information on behalf of the data owner
Responsible for availability of data, backup, and recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Management Process

A
  1. Framing
  2. Assessing
  3. Responding
  4. Monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk Assessment

A

Process of identifying, estimating, and prioritizing information security risks
Can be qualitative or quantitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk Assessment Evaluation

A
  1. Threats to assets
  2. Vulnerabilities present
  3. Likelihood that a threat will be realized by taking advantage of an exposure
  4. Impact of the exposure on the organization
  5. Countermeasures available
  6. Residual risk
17
Q

Risk Assessment Methodology

A
  1. Risk assessment process
  2. Explicit risk model
  3. Assessment approach
  4. Analysis approach
18
Q

Risk Factors

A
  1. Vulnerability - flaw or weakness in system security
  2. Threat - potential for threat-source to exercise particular vulnerability
  3. Likelihood of occurrence - weighted risk factor based on analysis of probability a given threat is capable of exploiting a given vulnerability
  4. Level of impact - magnitude of harm that can be expected
19
Q

Qualitative Risk Assessments

A

Used to assess risks based on NON-NUMERICAL categories or levels (i.e., low, medium, high)
Supports communicating risk results to decision makers
Results are descriptive rather than measurable
Used when: 1) Quantitative assessment skills are lacking 2) Timeframe is short 3) Paucity of data that can be used for risk assessment

20
Q

Quantitative Risk Assessments

A

Used to assess risks based on the use of NUMBERS
Supports cost-benefit analyses or alternative risk responses or courses of action
Usually done in conjunction with qualitative analysis
Aims to see whether the cost of the risk outweighs the cost of the countermeasure

21
Q

Semi-Quantitative Assessments

A

Used to asses risks that use bins, scales, or representative numbers whose values and meanings are not maintained in other contexts (i.e., 1 (low) - 10 (high))

22
Q

Conducting Risk Assessment

A
  1. Identify threat source
  2. Identify threat events
  3. Identify vulnerabilities
  4. Determine likelihood that identified threat source would initiate specific threat events (and they be successful)
  5. Determine adverse impacts to organization
  6. Determine information security risks as combination of likelihood of threat exploitation of vulnerabilities and impact of such exploitation