Managing Risk Flashcards
Risk Calculations
Weigh the potential threat against the likelihood of it occurring
Residual Risk
Risk that will and must remain
Annual Loss Expectancy (ALE)
A calculation used to identify risks and calculate the expected loss each year
ALE
Annual Loss Expectancy
Annualized Rate of Occurrence (ARO)
A calculation of how often a threat will occur
ARO
Annualized Rate of Occurrence
Asset Value (AV)
The assessed value of an item
AV
Asset Value
Exposure Factor (EF)
The potential percentage of loss to an asset if a threat is realized
MTD
Maximum Tolerable Downtime
MTBF
mean time between failure
MTTF
mean time to failure
MTTR
mean time to restore
Recovery point objective (RPO)
The point last known good data prior to an outage that is used to recover systems
RPO
Recovery point objective
Recovery time objective (RTO)
The max amount of time that a process or service is allowed to be down and the consequences still be considered acceptable
RTO
recovery time objective
Redundant Array of Independent Disks (RAID)
A configuration of multiple hard disks used to provide fault tolerance should a disk fail
RAID
Redundant Array of Independent Disks
single loss expectancy (SLE)
The cost of a single loss when it occurs
SLE
single loss expectancy
SLA
service level agreement
SPOF
single point of failure
Risk calculation formula
SLE x ARO = ALE
threat
anything that can harm your resources
Types of threats
Environmental
Manmade
Internal vs External
vulnerability
a weakness that could be exploited by a threat
Chief components of a risk assessment process
- Risks to which the organization is exposed
- Risks that need addressing
- Coordination with the business impact analysis (BIA)
BIA
business impact analysis
Threat Vector
the way in which an attacker poses a threat (particular tool or means of exploiting)
A privacy impact assessment (PIA) requires what three things?
- To ensure conformance with applicable legal, regulatory, and policy requirements for privacy
- Determine risks and effects
- Evaluate protections and alternative processes to mitigate potential privacy risks
The four possible responses to identifying and assessing the risks that exist
Risk Avoidance
Risk Transference
Risk Mitigation
Risk Acceptance
Audits used in risk mitigation
- user rights
- permission reviews
- change management
- incident management
cloud computing
hosting services and data on the Internet instead of hosting it locally
Three ways of implementing cloud computing
- Platform as a Service
- Software as a Service
- Infrastructure as a Service
Platform as a Service (PaaS)
Vendors allow apps to be created and run on their infrastructure.
Known as ‘cloud platform service’