Module 4 - Risk Management Flashcards

1
Q

The process of identifying risk, assessing its relative magnitude, and taking steps to reduce it to an acceptable level.

A

Risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The recognition, enumeration, and documentation of risks to an organization’s information assets

A

Risk identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A determination of the extent to which an organization’s information assets are exposed to risk.

A

Risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The application of safeguards or controls that reduce the risks to an organization’s information assets to an acceptable level.

A

Risk treatment (risk control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The overall structure of the strategic planning and design for the entirety of the organization’s RM efforts.

A

The RM framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The implementation of risk management, as specified in the framework

A

The RM process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The RM framework consists of five key stages:

A
  1. Executive governance and support
  2. Framework design
  3. Framework implementation
  4. Framework monitoring and review
  5. Continuous improvement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Management Policy

A

This policy converts the instructions and perspectives provided to the RM framework team by the governance group into cohesive guidance that structures and directs all subsequent risk management efforts within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility

A

Risk appetite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The risk to information assets that remains even after current controls have been applied

A

Residual risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The assessment of the amount of risk an organization is willing to accept for a particular information asset.

A

Risk tolerance (risk threshold)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Prepare for the risk process by performing the following tasks (5):

A
  1. Identify the purpose of the assessment;
  2. Identify the scope of the assessment;
  3. Identify the assumptions and constraints associated with the assessment;
  4. Identify the sources of information to be used as inputs to the assessment;
  5. Identify the risk model and analytic approaches.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The final step in the risk identification process is to:

A

prioritize, or rank-order, the assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

During the identification of risk, managers must(4):

A
  1. Identify the organization’s information assets
  2. Classify them
  3. Categorize them into useful groups
  4. Prioritize them by overall importance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If a vulnerability is fully managed by an existing control:

A

it can be set aside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Assesses the relative risk for each vulnerability and assigns a risk rating or score to each information asset.

A

Risk analysis

17
Q

The overall rating—a numerical value on a defined scale—of the probability that a specific vulnerability will be exploited or attacked, commonly referred to as a threat event.

A

Likelihood

18
Q

The magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability

A

The level of impact from a threat event

19
Q

likelihood of threat event (attack) x impact (or consequence), plus or minus an element of uncertainty

A

risk

20
Q

If residual risk is greater than risk, look for:

A

treatment strategies to further reduce the risk.

21
Q

Four basic risk treatment strategies:

A
  1. Mitigation
  2. Transference
  3. Acceptance
  4. Termination
22
Q

Attempts to prevent the exploitation of the vulnerability.

A

Risk mitigation

23
Q

Attempts to shift risk to another entity

A

Transference risk treatment strategy, AKA risk sharing or risk transfer

24
Q

The key to an effective transference risk treatment strategy is the implementation of an effective:

A

service level agreement (SLA)

25
Q

Risk acceptance

A

The decision to do nothing beyond the current level of protection to shield an information asset from risk and to accept the outcome from any resulting exploitation

26
Q

Based on the organization’s intentional choice not to protect an asset.

A

Risk avoidance or risk termination

27
Q

Involve requesting and providing information as direct feedback about issues that arise in the implementation and operation of each stage of the process

A

Process communications

28
Q

Involves establishing and collecting formal performance measures and assessment methods to determine the relative success of the RM program.

A

Process monitoring and review

29
Q

Expected loss per risk formulas:

A

Annualized loss expectancy (ALE) = single loss expectancy (SLE) × annualized rate of occurrence (ARO)‏

SLE = asset value × exposure factor (EF)‏

30
Q

Determines if an alternative being evaluated is worth the cost incurred to control the vulnerability

A

Cost benefit Analysis

31
Q

The two ISOs that focus on Risk management

A

ISO 27005 information technology — security techniques — information security risk management

ISO 31000 risk management – guidelines

32
Q

Two documents that describe the NIST RMF

A

SP 800-37, Rev. 2 Risk Management Framework for Information Systems and Organizations

SP 800-39 Managing Information Security Risk: Organization, Mission, and Information System View

33
Q
A