Module 1 - Unit 6 Risk Response And Risk Treatment Flashcards
Define cyber risk
Any risk of financial loss, disruption or damage to the reputation of an organisation from some sort of failure of its information technology systems.
Define Risk Treatment
The process of selecting and implementing of measures to modify risk. Risk treatment measures can include avoiding, optimizing, transferring or retaining risk.
What are the 4 T’s?
Risk strategies for threats or hazard risks.
Tolerate hazard risk if the severity is less than the risk appetite and tolerate low severity risk and long as they are not too frequent
Treat risk by retaining it in the organisation and taking action to modify its severity, likelihood or impact.
Transfer risk exposure to a third party
Terminate if the residual risk remain too high
What are the 4 E’s?
Are response strategies for opportunities risk.
Explore entreprenorial opportunities
Exist declining markets
Exploit opportunities until competitors arrive
Exit the opportunity through a successful and profitable sale
What are the 4 risk control techniques? (PCDD)
Preventative - to prevent a transaction (TERMINATE)
Corrective - used when the preventative controls fail (TREAT)
Directive - based on giving directions (TRANSFER)
Detective - include fire alarma or an audit review (TOLERATE)
What are the 5 C’s of Credit Risk?
Character - the reputation of a company
Capital - how the company is currently financed
Conditions - where the company operates
Capacity - of the company to repay the loan
Collateral - assets the bank can claim if the company could not repay the loan
What are the 5 components of BCP?
Prepare - for emergency
Prepare - crisis
Manage - crisis and minimise damage
Recover
Respond effectively.
7 functions that can be outsourced
IT
ADMINISTRATION
DISTRIBUTION AND LOGISTICS
HR
CALL CENTRES
SALES AND MARKETING
REAL ESTATE MANAGEMENT
5 reasons for outsourcing
- Streamline operations
- Cost control
- Freeing up resources for other work
- Improving quality and service
- Resources not available internally
5 cyber risk controls:
Identify benefits of cyber security
Good communication
Identify critical information assets
Develop multiple layers of defence
Develop controls that detect attacks quickly