Lesson 1: Risk Management Activities Flashcards
What are the 5 Phases of risk management?
1) Identification of mission critical functions –> Know your critical functions to prioritize risk management.
2) Identification of known vulnerabilities –> List all known vulnerabilities to your functions.
3) Identification of potential threats –> For each function, identify the threat sources and actors that may exploit or accidentally expose vulnerabilities.
4) Analysis of business impact –> use qualitative and quantitative methods to analyze likelihood and impact.
5) Identification of risk responses –> For each risk, identify possible countermeasures.
What are the important variables considered when evaluating risk?
1) likelihood –> This is the probability of the threat being realized.
2) impact –> Is the severity of the risk if realized (e.g. value of the asset, financial impacts, etc.)
What is quantitative risk analysis?
It involves the use of numbers (generally money) to evaluate impacts
List and explain the variables used in quantitative risk analysis
1- Single Loss Expectancy (SLE) –> The amount that would be lost in a single occurrence of the risk factor.
2- Annual Rate of Occurrence (ARO) –> The number of times in a year that the single loss occurs
3- Annual Loss Expectancy (ALE) –> The amount that would be lost over the course of a year, or the sum total of all single loss events over the span of 12 months.
4- Asset Value –> The value of an asset
5- Exposure Factor (EF) –> The percentage of the asset value that would be lost.
What is the formula used in calculating the SLE?
SLE =AV x EF
What is the formula used in calculating the ALE?
ALE = SLE x ARO
What are the additional quantitative measures used within an organization?
1- Total Cost of Ownership (TCO) –> This includes all associated costs of an asset (acquisition, maintenance, operations, etc..)
2- Return on Investment (ROI) –> A performance measure that compares the cost of an item to the benefit it provides.
3- Mean Time To Recover (MTTR) –> This is a measure of downtime duration, the time elapsed between when a service or device fails and when it’s functionality is restored.
4- Mean Time Between Failures (MTBF) –> The amount of time a service can be expected to run before it experiences an outage.
5- Gap Analysis –> A gap analysis measures the difference between current state and desired state.
What is qualitative risk analysis?
Qualitative risk analysis describes the evaluation of risk through the use of words.
List and explain the 4 risk responses
1- Avoidance –> means that you stop doing the activity that is risk-bearing.
2- Acceptance –> means that an identified risk area has been evaluated and this resulted in an agreement to continue operating the system.
3- Mitigate –> is the overall process of reducing exposure to, or the effects of, risk factors.
4- Transfer –> means assigning risk to a third party, which is most typically exemplified through the purchase of an insurance policy.
what is the difference between inherent risk and residual risk?
Inherent risk is the level of risk that exists before any type of mitigation has been implemented.
Residual risk is the likelihood and impact after specific mitigation, transference, or acceptance measures have been applied.
What is risk appetite?
Risk appetite is a strategic assessment of what level of residual risk is tolerable for an organization.
True or False
Residual an acceptable risk are always equivalent.
False
Certain identified risk area cannot be mitigated to an acceptable level.
What is risk management?
Risk management describes the set of policies and processes used by an organization to help it locate, describe, prioritize, and mitigate risks in a consistent and repeatable way.
List 5 risk frameworks
NIST CSF –> National Institute of Standards and Technology Cybersecurity Framework
ISO 31000 –> International Organization for Standardization 31000
NIST RMF –> National Institute of Standards and Technology Risk Management Framework
COBIT –> Control Objectives for Information ad Related Technologies
COSO –> Committee of Sponsoring Organizations of the Treadway Commission.
What are the 5 core functions of NIST CSF?
Identify
Protect
Detect
Respond
Recover
List the 7 risk management steps defined by NIST CSF
Prioritize and scope
Orient
Create a current profile
Conduct a risk assessment
Create a target profile
Determine, analyze, and prioritize gaps
Implement action plan
List the 7 steps of NIST RMF
Prepare
Categorize
select
Implement
Assess
Authorize
Monitor