MODULE 2 PRELIM Flashcards

1
Q

is the process of identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize, monitor, and control the probability or impact of unfortunate events.

A

RISK MANAGEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

KEY ELEMENTS OF RISK MANAGEMENT

A
  • RISK IDENTIFICATION
  • RISK ASSESSMENT
  • RISK MITIGATION
  • RISK MONITORING AND REVIEW
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TYOES OF RISKS IN AN ORGANIZATION

A
  • OPERATIONAL RISKS
  • R=FINANCIAL RISKS
  • REPUTATIONAL RISKS
  • COMPLIANCE RISKS
  • CYBERSECURITY RISKS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Failure of internal processes, systems, or human error.

A

OPERATIONAL RISKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Economic uncertainties, cash flow issues, and market volatility.

A

FINANCIAL RISKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Damage to brand or public perception.

A

REPUTATIONAL RISKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Violating laws, regulations, or industry standards.

A

COMPLIANCE RISKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data breaches, hacking, and cyber-attacks

A

CYBERSECURITY RISKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A _______ is a set of rules and guidelines that govern how an organization protects its assets, data, and systems from unauthorized access or attacks.

A

SECURITY POLICIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Implementing firewalls, encryption, and access controls. Conducting regular security audits and penetration tests.

A

PROACTIVE MEASURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Incident response protocols and post-breach investigations. Data breach notification and recovery strategies.

A

REACTIVE MEASURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

tandards provide specific technical and procedural measures to ensure security practices are followed uniformly across organizations.

A

SECURITY STANDARDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EXAMPLE OF SECURITY STANDARDS

A
  • ISO/IEC 27001
  • NIST CYBERSECURITY FRAMEWORK
  • PCI-DSS
  • HIPAA

INTERNATIONAL STANDARDIZATION FOR ORGANIZATIONS
INTERNATIONAL ELECTROTECHNICAL COMMISSION
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
PAYMENT CARD INDUSTRY DATA SECURITY STANDARD
INSURANCE PORTABILITY AND ACCOUNTABILITY ACT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly