Lesson 1: Risk Management Activities Flashcards

1
Q

What are the 5 Phases of risk management?

A

1) Identification of mission critical functions –> Know your critical functions to prioritize risk management.
2) Identification of known vulnerabilities –> List all known vulnerabilities to your functions.
3) Identification of potential threats –> For each function, identify the threat sources and actors that may exploit or accidentally expose vulnerabilities.
4) Analysis of business impact –> use qualitative and quantitative methods to analyze likelihood and impact.
5) Identification of risk responses –> For each risk, identify possible countermeasures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the important variables considered when evaluating risk?

A

1) likelihood –> This is the probability of the threat being realized.
2) impact –> Is the severity of the risk if realized (e.g. value of the asset, financial impacts, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is quantitative risk analysis?

A

It involves the use of numbers (generally money) to evaluate impacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List and explain the variables used in quantitative risk analysis

A

1- Single Loss Expectancy (SLE) –> The amount that would be lost in a single occurrence of the risk factor.

2- Annual Rate of Occurrence (ARO) –> The number of times in a year that the single loss occurs

3- Annual Loss Expectancy (ALE) –> The amount that would be lost over the course of a year, or the sum total of all single loss events over the span of 12 months.

4- Asset Value –> The value of an asset

5- Exposure Factor (EF) –> The percentage of the asset value that would be lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the formula used in calculating the SLE?

A

SLE =AV x EF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the formula used in calculating the ALE?

A

ALE = SLE x ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the additional quantitative measures used within an organization?

A

1- Total Cost of Ownership (TCO) –> This includes all associated costs of an asset (acquisition, maintenance, operations, etc..)

2- Return on Investment (ROI) –> A performance measure that compares the cost of an item to the benefit it provides.

3- Mean Time To Recover (MTTR) –> This is a measure of downtime duration, the time elapsed between when a service or device fails and when it’s functionality is restored.

4- Mean Time Between Failures (MTBF) –> The amount of time a service can be expected to run before it experiences an outage.

5- Gap Analysis –> A gap analysis measures the difference between current state and desired state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is qualitative risk analysis?

A

Qualitative risk analysis describes the evaluation of risk through the use of words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List and explain the 4 risk responses

A

1- Avoidance –> means that you stop doing the activity that is risk-bearing.

2- Acceptance –> means that an identified risk area has been evaluated and this resulted in an agreement to continue operating the system.

3- Mitigate –> is the overall process of reducing exposure to, or the effects of, risk factors.

4- Transfer –> means assigning risk to a third party, which is most typically exemplified through the purchase of an insurance policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is the difference between inherent risk and residual risk?

A

Inherent risk is the level of risk that exists before any type of mitigation has been implemented.
Residual risk is the likelihood and impact after specific mitigation, transference, or acceptance measures have been applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is risk appetite?

A

Risk appetite is a strategic assessment of what level of residual risk is tolerable for an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False
Residual an acceptable risk are always equivalent.

A

False
Certain identified risk area cannot be mitigated to an acceptable level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is risk management?

A

Risk management describes the set of policies and processes used by an organization to help it locate, describe, prioritize, and mitigate risks in a consistent and repeatable way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List 5 risk frameworks

A

NIST CSF –> National Institute of Standards and Technology Cybersecurity Framework
ISO 31000 –> International Organization for Standardization 31000
NIST RMF –> National Institute of Standards and Technology Risk Management Framework
COBIT –> Control Objectives for Information ad Related Technologies
COSO –> Committee of Sponsoring Organizations of the Treadway Commission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 5 core functions of NIST CSF?

A

Identify
Protect
Detect
Respond
Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List the 7 risk management steps defined by NIST CSF

A

Prioritize and scope
Orient
Create a current profile
Conduct a risk assessment
Create a target profile
Determine, analyze, and prioritize gaps
Implement action plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List the 7 steps of NIST RMF

A

Prepare
Categorize
select
Implement
Assess
Authorize
Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is ISO 31000 all about?

A

is a very comprehensive framework and considers risks outside of cybersecurity, including risks to financial, legal, competitive, and customer service functions.

19
Q

Which organization created COBIT?

A

ISACA –> Information Systems Audit and Controls Association

20
Q

What is COBIT all about?
What are the 5 components of COBIT?

A

COBIT: frames IT risk from the viewpoint of business leadership.

The 5 components of COBIT are:
Framework
Process descriptions
Control objectives
Management guidelines
Maturity models

20
Q

What is COSO?

A

COSO is an initiative of five private sector organizations collaborating on the development of risk management frameworks. The Enterprise Risk Management — Integrated Framework defines an approach to managing risk from a strategic leadership point of view.

21
Q

What are the 4 phases common to all risk management life cycles?

A

Identify –> This phase includes the identification of risk items.
Assess –> This phase analyzes identified risks to determine their associated level of risk.
Control –> This phase identifies effective means by which identified risks can be reduced.
Review –> Each risk item must be periodically re-evaluated to determine if the risk level has changed and/or if the identified controls are still effective.

22
Q

What are the 3 control categories?

A

People
Processes
Technology

23
Q

Explain the 5 capabilities outlined in NIST CSF

A

Identify –> This function involves the analysis and management of organizational risks. Risks can be realized in many areas, including people, data, systems and processes and this process works to help an organization locate, describe and analyze these risks in order to develop a prioritized approach to their management.

Protect –> This function describes the capabilities needed to ensure consistent operation of all critical business functions and limit the impacts of any adverse events.

Detect –> This function defines the capabilities needed for the timely discovery of security incidents.

Respond –> This function seeks to limit the impact of a cybersecurity incident by defining appropriate actions to be taken upon its discovery

Recover –> This function defines the necessary activities for restoring any disrupted service to their original, or intended state, following a cybersecurity incident.

24
Q

What is a risk register?

A

A risk register provides an effective visualization of identified risks and include descriptions and information about mitigating controls.

25
Q

What is a KPI?

A

A KPI is a formal mechanism designed to measure performance of a program against desired goals.

26
Q

What is a KRI?

A

A KRI is a metric that helps organizations identify and monitor potential risks that could negatively impact their operations, financial health, or overall performance.

27
Q

List 5 examples of KPIs

A

Patch status
Intrusion attempts
unidentified devices
security incidents
user awareness and training

28
Q

What is risk tolerance?

A

Risk tolerance defines the acceptable level of risk for individual risks within the broader risk appetite.

29
Q

What is tradeoff analysis?

A

It describes how decisions are made after reviewing risks and rewards, by comparing potential benefits to potential risks, and determining a course of action based on adjusting factors that contribute to each area.

30
Q

Which organization developed the Architecture Tradeoff Analysis Method (ATAM)?

A

The Software Engineering Institute (SEI) at the Carnegie Mellon University.

31
Q

What is ATAM used for?

A

ATAM allows formal evaluation of architectures based upon the analysis of risks and desired outcomes.

32
Q

True or False
Technology alone can guarantee a safe and secure environment.

A

False
Technology alone cannot guarantee a safe and secure environment, so it is absolutely essential for people to be trained in the safe and appropriate use of technology and that user activity within an information system can be reviewed for compliance and accountability.

33
Q

List and explain the strategies that can be used to reduce the likelihood of fraud and limit the impacts of insider threat

A

separation of duties –> is a means of establishing checks and balances against the possibility that critical systems or procedures can be compromised by insider threats. Duties and responsibilities should be divided among individuals to prevent ethical conflicts or abuse of powers.

Job rotation –> (or rotation of duties) means that no one person is permitted to remain in the same job for an extended period.

Mandatory vacation –> means that employees are forced to take their vacation time, during which someone else fulfills their duties. The typical mandatory vacation policy requires that employees take at least one vacation a year in a full-week increment so that they are away from work for at least five days in a row. During that time, the corporate audit and security employees have time to investigate and discover any discrepancies in employee activity

Least privilege –> means that a user is granted sufficient rights to perform his or her job and no more. This mitigates risk if the account should be compromised and fall under the control of a threat actor.

34
Q

What are the 3 cloud service types?

A

Software as a Service (SaaS) –> represents the lowest amount of responsibility for the customer as the facilities, utilities, physical security, platform, and applications are the responsibility of the provider.

Platform as a Service (PaaS) –> provides a selection of operating systems that can be loaded and configured by the customer, the underlying infrastructure, facilities, utilities, and physical security are the responsibility of the provider.

Infrastructure as a Service (IaaS) –> provides hardware hosted at a provider facility using the provider’s physical security controls and utilities, such as power.

35
Q

What is vendor lock-in?

A

Describes when a customer is completely dependent on a vendor for products or services because switching is either impossible or would result in substantial complexity and costs.

36
Q

What is vendor lockout?

A

Describes when a vendor’s product is developed in a way that makes it inoperable with other products, the ability to integrate it with other vendor products is not a feasible option, or does not exist.

37
Q

What is vendor viability?

A

Is an important measurement used to determine if a vendor will be in-business on an on-going basis.

38
Q

What is source code escrow?

A

Identifies that a copy of vendor-developed source code is provided to a trusted third party in case the vendor ceases to be in business.

39
Q

what is support availability?

A

Defines the steps taken to verify the type and level of support to be provided by the vendor in support of their product or service. It is common for support performance and maintenance fees to be defined via a service level agreement (SLA.)

40
Q

What process does the following statement define?
This describes the formal measures taken to validate that the vendor’s delivered service or product offering aligns to established requirements.

A

Meeting client requirements

41
Q

List 2 ongoing vendor assessment tools

A

Vendor policies
Ongoing assessment and compliance

42
Q

what is supply chain visibility (SCV)

A

It describes the capacity to understand how all vendor hardware, software, and services are produced and delivered as well as how they impact an organization’s operations or finished products.