IT risk assessment Flashcards
what is risk assessment?
process used to identify and evaluate risk and its potential effects, which includes evaluation of the
- critical functions necessary for an enterprise to continue business operations
- risk associated with each of the critical functions
- controls in place to reduce exposure and their cost
- prioritization of the risk on the basis of their likelihood and potential impact
- relationship between the risk and the enterprise risk appetite and tolerance
what is a Bayesian analysis
method of statistical inference that uses prior distribution data to determine the probability of a result
what is business impact analysis
process to determine the impact of losing the support of any resource. in addition to identifying initial impact, a comprehensive BIA seeks to establish the escalation of loss over time. the goal of a BIA is to provide reliable data on the basis of whether senior management can make the appropriate decision
what is a fault tree analysis?
starts with an event and examines possible means for the event to occur (top-down) and displays these results in a logical tree diagram.
what is an event tree analysis?
forward looking , bottom up model that uses inductive reasoning to assess the probability of different events resulting in possible outcomes.
what is a cause and consequence analysis
combines techniques of a fault tree analysis and an event tree analysis and allows for time delays to be considered
what is a cause and effect analysis
looks at factors that contributed to a certain effect and groups the causes into categories (using brainstorming), which are then displayed using a diagram, typically a tree structure or a fishbone
what is a hazard analysis and critical control points?
originally designed for the food safety industry, this system proactively prevents risk and assures quality, reliability and safety of processes.
what is Hazop
structured means of identifying and evaluating potential risk by looking at possible deviations from existing processes
what is human reliability analysis?
HRA examines the effect of human error on systems and their performance
what is layers of protection analysis
LOPA is a semi-quantitative risk analysis technique that uses aspects of HAZOP data to determine risk associated with risk events. it also looks at controls and their effectiveness.
what is a markov analysis
Markov analysis is used to analyze systems that can exists in multiple states
what is a preliminary hazard analysis?
looks at what threats or hazards may harm an organization’s activities, facilities or systems. the result if a list of potential risk
reliability centered maintenance
analyzes the functions and potential failures of a specific asset, particularly a physical asset such as an equipment
sneak circuit analysis
use to identify design errors or sneak conditions such as latent hardware, software or integrated conditions that are often undetected by system tests and ma result in improper operations, loss of availability, program delays or injury to personnel.
what are policies
policies provide direction regarding acceptable and unacceptable behaviors and actions to the organization. standards and procedures support the requirements defined in the policies set by the organization.
what are the different level of policies ?
High level policy: issued as a way to address the objectives of the organizations mission and vision statement. this policy does not have a technical focus in order to prevent it from becoming outdated when technology changes
technical and functional policy: include specifics regarding technology use. these policies are subject to change as technology changes and new systems are developed
what are some considerations that affect risk assessment related to technology?
- age of equipment
- expertise available for maintenance
- variety of vendors/suppliers
- documentation of systems
- availability of replacement parts
- ability to test systems or equipment
- operating environment and user expertise
- ability to patch/mitigate vulnerabilities
why is it important to have an enterprise approach to architecture?
the lack of an enterprise architecture results in ownership gaps between systems and unclear areas of responsibility for incident or configuration management.
List the control categories
o Preventative controls: inhibit attempts to violate security policy. E.g. encryption, user authentication and vault construction doors
o Deterrent: provide warnings that may dissuade threat agents from attempting compromise. E.g. warning banners on login screen and rewards for the arrest of hackers
o Directive: mandate behavior by specifying what actions are and are not permitted. E.g. a policy
o Detective: provide warning of violations or attempted violations of security policy. Audit trails, intrusion detection systems and checksums
o Corrective: remediate errors, omissions, unauthorized uses and intrusions when detected. E.g. data backups, error correction, and automated failover are examples of corrective controls
o Compensating: an alternate form of a control that corrects a deficiency or weakness in the control structure of the enterprise. This may be considered when an entity cannot meet a stated requirement due to legitimate technical or business constraints but can create a comparably accepted level of risk by other means. E.g. placing unsecured systems on isolated network segments with strong perimeter security and adding third-party challenge-response mechanisms to devices that do not support individual login accounts.