Risk Flashcards
What is risk?
a possibility of having a negative impact.
The internal man-made threats are more serious than the external ones because internal person that within the organization have the access rights to your data, and of course your business process, so that they can damage you the most compared to external.
Hardware failure means your hard disk might be damaged, you might lose the data in your hard disk. Or maybe your servers could be down. All these kinds of hardware failure. The next one is going to be software. Your core software can be corrupted because of various reasons, maybe virus attack, maybe just hard disk failure and you’re done with software
Hardware failure means your hard disk might be damaged, you might lose the data in your hard disk. Or maybe your servers could be down. All these kinds of hardware failure. The next one is going to be software. Your core software can be corrupted because of various reasons, maybe virus attack, maybe just hard disk failure and you’re done with software
. Impact means we try to measure the damage due to the threat that you face. When you measure it, sometimes we can easily measure in terms of dollars, for example, because of the threat you lost your business, and then you see that the dollar amount that you lost.
. Impact means we try to measure the damage due to the threat that you face. When you measure it, sometimes we can easily measure in terms of dollars, for example, because of the threat you lost your business, and then you see that the dollar amount that you lost.
Risk mitigation means, reduce the risks using controls.
Risk mitigation means, reduce the risks using controls.
The more controls you add the more mitigation (risk reduction) you do to the control.
The more controls you add the more mitigation (risk reduction) you do to the control.
SR mgt decides when to stop. Most control ranges are at 40-60%. If anything happens it is on mgmt.
SR mgt decides when to stop. Most control ranges are at 40-60%. If anything happens it is on mgmt.
Why can’t we just transfer it without doing any controls whatsoever? Problem here is this, if you do it without any controls, then the insurance agent will come and do their own risk assessment to the organization. The insurance premium that you have to pay would be extremely high. Organizations always reduce the risk using controls to a level they feel comfortable. In other words, to a level that management feel most comfortable. If they are still worrying about the remaining risk, then we buy the insurance and transfer it to the third party.
Why can’t we just transfer it without doing any controls whatsoever? Problem here is this, if you do it without any controls, then the insurance agent will come and do their own risk assessment to the organization. The insurance premium that you have to pay would be extremely high. Organizations always reduce the risk using controls to a level they feel comfortable. In other words, to a level that management feel most comfortable. If they are still worrying about the remaining risk, then we buy the insurance and transfer it to the third party.
There are two different scenarios that we do risk re-evaluation, we call time driven and event driven. Time driven means we do periodically, that means once every six months time, we do the risk assessment and risk mitigation, or once in every year. That’s called time driven. There’s no external factor whatsoever, we just do it. The second one we call event driven. Event driven means, when there is environment change, let me give you guys some examples of environment change. You guys do traditional banking. Now, if you do go for e-banking, that’s environment change within the organization.
There are two different scenarios that we do risk re-evaluation, we call time driven and event driven. Time driven means we do periodically, that means once every six months time, we do the risk assessment and risk mitigation, or once in every year. That’s called time driven. There’s no external factor whatsoever, we just do it. The second one we call event driven. Event driven means, when there is environment change, let me give you guys some examples of environment change. You guys do traditional banking. Now, if you do go for e-banking, that’s environment change within the organization.
Ex. Preventive Software- Malware Detection
Detective control, sometimes the security administrators keep firewalls, that firewalls could detect any of these unauthorized access to the system and would give alarm to the security administrators.
Corrective control means if any case that our data is being corrupted, we can do the restoration. This is a classical example of corrective control. It has sometimes a preventative nature, again data loss possibly.
Corrective control means if any case that our data is being corrupted, we can do the restoration. This is a classical example of corrective control. It has sometimes a preventative nature, again data loss possibly.
hat is a preventative control, prevent unauthorized access. When we access to certain systems, we do have a preventative control to prevent unauthorized access.
hat is a preventative control, prevent unauthorized access. When we access to certain systems, we do have a preventative control to prevent unauthorized access.
hat is a preventative control, prevent unauthorized access. When we access to certain systems, we do have a preventative control to prevent unauthorized access.
Log of users is to find out who logged in a given period of time, who made the change to the system. So that is detective control. That’s for the accountability. When we do the record, in some systems, we might have logs. Scometimes we call it audit trails. In logs, in audit trails, we keep information about who accessed system, what kind of changes has been made to system, and if there’s any supervisors who have done the approval. And for example, if you want to keep track of the information, What was the information before? What is the information currently? You might have a before image, you might have after image. Of course we should have timestamp, which means the date and time, as well as whatever the information that you would like to keep record. This is a log of users. It’s a classical example of detective controls
Log of users is to find out who logged in a given period of time, who made the change to the system. So that is detective control. That’s for the accountability. When we do the record, in some systems, we might have logs. Scometimes we call it audit trails. In logs, in audit trails, we keep information about who accessed system, what kind of changes has been made to system, and if there’s any supervisors who have done the approval. And for example, if you want to keep track of the information, What was the information before? What is the information currently? You might have a before image, you might have after image. Of course we should have timestamp, which means the date and time, as well as whatever the information that you would like to keep record. This is a log of users. It’s a classical example of detective controls