M8: IT security management and risk assessment Flashcards

1
Q

What is the main purpose of risk management in information security?

M8: IT security management and risk assessment

A

To help the organization’s leadership prioritize resources to manage risks effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does ISO-27001 define as a risk?

M8: IT security management and risk assessment

A

The effect of uncertainty on objectives, which can be positive or negative.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the five main activities in the risk management process?

M8: IT security management and risk assessment

A
  • Context Establishment
  • Risk assessment
  • Risk treatment
  • Risk acceptance
  • Risk monitoring.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the first step in the risk management process?

M8: IT security management and risk assessment

A

Establishing the context of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is risk assessment?

M8: IT security management and risk assessment

A

Identifying, analyzing, and evaluating risks based on the defined context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four options for risk treatment?

M8: IT security management and risk assessment

A
  • Modify
  • Accept
  • Avoid
  • Share
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a risk treatment plan?

M8: IT security management and risk assessment

A

A plan that describes how identified risks will be managed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who is responsible for risk management in an organization?

M8: IT security management and risk assessment

A

The organization’s top management and the information security committee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of the information security committee?

M8: IT security management and risk assessment

A

To approve and define the framework for risk management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is risk acceptance?

M8: IT security management and risk assessment

A

The decision to accept the risk without further action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of risk monitoring?

M8: IT security management and risk assessment

A

To ensure that risk controls are implemented and effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a risk matrix?

M8: IT security management and risk assessment

A

A tool to illustrate the level of risk based on likelihood and impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should be included in a risk treatment plan?

M8: IT security management and risk assessment

A
  • Purpose
  • Responsible person
  • Resources
  • Risk treatment actions
  • Costs
  • Timeline.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the significance of risk communication?

M8: IT security management and risk assessment

A

To create awareness about the risk profile and security efforts within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the importance of involving suppliers in risk management?

M8: IT security management and risk assessment

A

Suppliers have knowledge of technical solutions and controls that can affect risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main purpose of an IT contingency policy?

M8: IT security management and risk assessment

A

To set the overall framework for an organization’s IT contingency work and implementation.

17
Q

What should be the starting point for IT contingency planning?

M8: IT security management and risk assessment

A

A risk assessment based on business needs or requirements.

18
Q

Who is responsible for approving the IT contingency policy?

M8: IT security management and risk assessment

A

The organization’s management.

19
Q

Why is it not recommended to use ‘find and replace’ to create a contingency policy?

M8: IT security management and risk assessment

A

Because the policy should be tailored to the organization’s specific needs and language.

20
Q

What is the role of external suppliers in IT contingency planning?

M8: IT security management and risk assessment

A

They should be involved if the organization outsources IT operations.

21
Q

What is the difference between a policy and a plan in IT contingency?

M8: IT security management and risk assessment

A

The policy is more long-term and less maintenance-intensive… while the plan is operational and detailed.

22
Q

What should be included in the IT contingency plan?

M8: IT security management and risk assessment

A
  • Purpose
  • Responsible person
  • Resource effort
  • Mitigation actions
  • Other costs
  • Timeline.
23
Q

What is the importance of having a clear classification of information?

M8: IT security management and risk assessment

A

To determine the sensitivity and required protection levels for
* Confidentiality
* Availability
* Integrity.

24
Q

What is a ‘risk owner’?

M8: IT security management and risk assessment

A

The person responsible for managing a specific risk.

25
Q

Why is it important to involve the organization’s communication unit in risk assessment planning?

M8: IT security management and risk assessment

A

To raise awareness about the organization’s risk profile and security efforts.

26
Q

What is the purpose of a risk management plan?

M8: IT security management and risk assessment

A

To describe how identified risks will be handled, including mitigation actions and timelines.

27
Q

What should be done if IT operations are outsourced?

M8: IT security management and risk assessment

A

Involve the external supplier in the risk assessment and management process.

28
Q

What is the benefit of integrating information security management with overall risk management?

M8: IT security management and risk assessment

A

It provides a more comprehensive and clear risk picture for the organization