Risk Flashcards

1
Q

What is risk?

A

a possibility of having a negative impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The internal man-made threats are more serious than the external ones because internal person that within the organization have the access rights to your data, and of course your business process, so that they can damage you the most compared to external.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hardware failure means your hard disk might be damaged, you might lose the data in your hard disk. Or maybe your servers could be down. All these kinds of hardware failure. The next one is going to be software. Your core software can be corrupted because of various reasons, maybe virus attack, maybe just hard disk failure and you’re done with software

A

Hardware failure means your hard disk might be damaged, you might lose the data in your hard disk. Or maybe your servers could be down. All these kinds of hardware failure. The next one is going to be software. Your core software can be corrupted because of various reasons, maybe virus attack, maybe just hard disk failure and you’re done with software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

. Impact means we try to measure the damage due to the threat that you face. When you measure it, sometimes we can easily measure in terms of dollars, for example, because of the threat you lost your business, and then you see that the dollar amount that you lost.

A

. Impact means we try to measure the damage due to the threat that you face. When you measure it, sometimes we can easily measure in terms of dollars, for example, because of the threat you lost your business, and then you see that the dollar amount that you lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk mitigation means, reduce the risks using controls.

A

Risk mitigation means, reduce the risks using controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The more controls you add the more mitigation (risk reduction) you do to the control.

A

The more controls you add the more mitigation (risk reduction) you do to the control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SR mgt decides when to stop. Most control ranges are at 40-60%. If anything happens it is on mgmt.

A

SR mgt decides when to stop. Most control ranges are at 40-60%. If anything happens it is on mgmt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why can’t we just transfer it without doing any controls whatsoever? Problem here is this, if you do it without any controls, then the insurance agent will come and do their own risk assessment to the organization. The insurance premium that you have to pay would be extremely high. Organizations always reduce the risk using controls to a level they feel comfortable. In other words, to a level that management feel most comfortable. If they are still worrying about the remaining risk, then we buy the insurance and transfer it to the third party.

A

Why can’t we just transfer it without doing any controls whatsoever? Problem here is this, if you do it without any controls, then the insurance agent will come and do their own risk assessment to the organization. The insurance premium that you have to pay would be extremely high. Organizations always reduce the risk using controls to a level they feel comfortable. In other words, to a level that management feel most comfortable. If they are still worrying about the remaining risk, then we buy the insurance and transfer it to the third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

There are two different scenarios that we do risk re-evaluation, we call time driven and event driven. Time driven means we do periodically, that means once every six months time, we do the risk assessment and risk mitigation, or once in every year. That’s called time driven. There’s no external factor whatsoever, we just do it. The second one we call event driven. Event driven means, when there is environment change, let me give you guys some examples of environment change. You guys do traditional banking. Now, if you do go for e-banking, that’s environment change within the organization.

A

There are two different scenarios that we do risk re-evaluation, we call time driven and event driven. Time driven means we do periodically, that means once every six months time, we do the risk assessment and risk mitigation, or once in every year. That’s called time driven. There’s no external factor whatsoever, we just do it. The second one we call event driven. Event driven means, when there is environment change, let me give you guys some examples of environment change. You guys do traditional banking. Now, if you do go for e-banking, that’s environment change within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Ex. Preventive Software- Malware Detection

Detective control, sometimes the security administrators keep firewalls, that firewalls could detect any of these unauthorized access to the system and would give alarm to the security administrators.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Corrective control means if any case that our data is being corrupted, we can do the restoration. This is a classical example of corrective control. It has sometimes a preventative nature, again data loss possibly.

A

Corrective control means if any case that our data is being corrupted, we can do the restoration. This is a classical example of corrective control. It has sometimes a preventative nature, again data loss possibly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

hat is a preventative control, prevent unauthorized access. When we access to certain systems, we do have a preventative control to prevent unauthorized access.

A

hat is a preventative control, prevent unauthorized access. When we access to certain systems, we do have a preventative control to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

hat is a preventative control, prevent unauthorized access. When we access to certain systems, we do have a preventative control to prevent unauthorized access.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Log of users is to find out who logged in a given period of time, who made the change to the system. So that is detective control. That’s for the accountability. When we do the record, in some systems, we might have logs. Scometimes we call it audit trails. In logs, in audit trails, we keep information about who accessed system, what kind of changes has been made to system, and if there’s any supervisors who have done the approval. And for example, if you want to keep track of the information, What was the information before? What is the information currently? You might have a before image, you might have after image. Of course we should have timestamp, which means the date and time, as well as whatever the information that you would like to keep record. This is a log of users. It’s a classical example of detective controls

A

Log of users is to find out who logged in a given period of time, who made the change to the system. So that is detective control. That’s for the accountability. When we do the record, in some systems, we might have logs. Scometimes we call it audit trails. In logs, in audit trails, we keep information about who accessed system, what kind of changes has been made to system, and if there’s any supervisors who have done the approval. And for example, if you want to keep track of the information, What was the information before? What is the information currently? You might have a before image, you might have after image. Of course we should have timestamp, which means the date and time, as well as whatever the information that you would like to keep record. This is a log of users. It’s a classical example of detective controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
A
42
Q
A
43
Q
A
44
Q

There was a programmer in the bank, wrote his own program, he changed the lines of code in the bank’s system. He wrote a code and then he managed to get those whatever digits not to the bank but to his account. Nobody knew about it for many years. Eventually, the compliance officers came in and checked it out, and found that definitely this guy was doing something like this. This kind of thing should not happen in the future. In this case what we need to do is to come up with new regulations, in other words, new controls, to reduce the risk of this kind of thing happens.

A

There was a programmer in the bank, wrote his own program, he changed the lines of code in the bank’s system. He wrote a code and then he managed to get those whatever digits not to the bank but to his account. Nobody knew about it for many years. Eventually, the compliance officers came in and checked it out, and found that definitely this guy was doing something like this. This kind of thing should not happen in the future. In this case what we need to do is to come up with new regulations, in other words, new controls, to reduce the risk of this kind of thing happens.

45
Q
A
46
Q

t. The role of thumb is this, compliance testing passes, we don’t have to do too much substantive testing. That’s normal situation. Compliance testing passes, we don’t have it. But think about a situation where compliance officer goes to a bank, and found that that bank does not have a change management procedure. That banks says that programmer should do due diligence or whatever their own judgment to do the change.

A

t. The role of thumb is this, compliance testing passes, we don’t have to do too much substantive testing. That’s normal situation. Compliance testing passes, we don’t have it. But think about a situation where compliance officer goes to a bank, and found that that bank does not have a change management procedure. That banks says that programmer should do due diligence or whatever their own judgment to do the change.

47
Q
A
48
Q
A
49
Q
A
50
Q
A
51
Q
A
52
Q
A
53
Q
A
54
Q
A
55
Q
A
56
Q
A
57
Q
A
58
Q
A
59
Q

Unit testing means just test one module. Look at the input and then give an input and then observe the output, and see if the system performs correctly. Then we look at the integration testing. Integration testing means two systems as interaction. Interaction means basically output of module one could be an input to module two. That is called interface between module one and module two. What we do is, we look at the interface between two modules. That’s what we call integration testing.
Security testing means how good security features within your own system are. In this case what we do is, we do penetration testing. We might hire some ethical hackers to let them hack your system and see how good your system’s information security is. That’s what we should do before we roll out, before we implement system. Volume testing means we input lot of data to the system. Sometimes when we put lot of data to the system, the system may malfunction. So that is what we call volume testing. The next one is called stress testing. Stress testing means concurrent users, many users access the system exactly at the same time. Benchmarking means we compare two similar systems in terms of performance, and see how good, how bad it is. The question I’m going to ask is, which is the most important testing out of these all? The most important testing is final acceptance testing. All done, test plan, unit testing, integration testing and system testing are done by IT people. But final acceptance test has to be done by the users.

A

Unit testing means just test one module. Look at the input and then give an input and then observe the output, and see if the system performs correctly. Then we look at the integration testing. Integration testing means two systems as interaction. Interaction means basically output of module one could be an input to module two. That is called interface between module one and module two. What we do is, we look at the interface between two modules. That’s what we call integration testing.
Security testing means how good security features within your own system are. In this case what we do is, we do penetration testing. We might hire some ethical hackers to let them hack your system and see how good your system’s information security is. That’s what we should do before we roll out, before we implement system. Volume testing means we input lot of data to the system. Sometimes when we put lot of data to the system, the system may malfunction. So that is what we call volume testing. The next one is called stress testing. Stress testing means concurrent users, many users access the system exactly at the same time. Benchmarking means we compare two similar systems in terms of performance, and see how good, how bad it is. The question I’m going to ask is, which is the most important testing out of these all? The most important testing is final acceptance testing. All done, test plan, unit testing, integration testing and system testing are done by IT people. But final acceptance test has to be done by the users.

60
Q
A
61
Q
A
62
Q

? System does not exceed the predetermined amount. Can you think about an example? This could be the example that we have discussed before, salary example. $75,000 is the maximum limit. if salary is more than $75,000, system is going to reject.

A
63
Q
A
64
Q
A
65
Q
A
66
Q
A
67
Q
A
68
Q
A
69
Q
A
70
Q
A
71
Q
A
72
Q
A
73
Q
A
74
Q
A
75
Q
A
76
Q
A
77
Q
A
78
Q
A
79
Q
A
80
Q
A
81
Q
A
82
Q
A
83
Q
A
84
Q
A
85
Q
A
86
Q
A
87
Q
A
88
Q
A
89
Q
A
90
Q
A
91
Q
A
92
Q
A
93
Q

Tell us a time where you had to work in a group to complete a project.

A

supporting economic and financial stability.

Values - Our beliefs

Integrity: We are accountable to the highest ethical standards.

Inclusion: We have a workplace of inclusion and belonging.

Innovation: We explore and act on new ways to add value.

Service: We serve the public and each other as we carry out our mission.

Growth & Development: We invest in our employees.

94
Q

Walk me through the flow of a project youre proud of

A
95
Q

Q: Explain a time when you had a conflict with a supervisor or co-worker. How did you work through it?

A
96
Q

Q: Talk about a time when you realized you made a mistake. What did you do and how did you fix it?

A

During an IT audit, I once realized that I had overlooked a crucial security vulnerability in a client’s network. Upon discovery, I immediately took action following the SMART method:

Specific: I identified the exact nature of the oversight, pinpointing the specific system and its vulnerability.

Measurable: I assessed the potential impact of the vulnerability on the client’s network security, quantifying the risk in terms of potential data breaches and financial loss.

Achievable: I formulated a plan to rectify the mistake, ensuring it was feasible within the constraints of time and resources available.

Relevant: Recognizing the importance of addressing the vulnerability promptly, I ensured that the solution aligned with the client’s overarching security goals and compliance requirements.

Time-bound: I set a clear deadline for implementing the necessary security measures and conducted a follow-up audit to verify their effectiveness within the specified timeframe.

Ultimately, by swiftly acknowledging and remedying the oversight using the SMART method, I was able to strengthen the client’s network security and prevent potential cybersecurity threats.

97
Q

Q: Talk about a time where you had to do a task you had never done before.

A

Specific: In a prior role, I encountered a conflict with a supervisor regarding the approach to an IT auditing project.

Measurable: The conflict arose due to differing opinions on the prioritization of audit tasks and the allocation of resources.

Achievable: To address the conflict, I initiated a one-on-one meeting with the supervisor to discuss our perspectives openly and find common ground.

Relevant: Recognizing the importance of maintaining a positive working relationship and achieving the project’s objectives, I ensured that our discussion remained focused on the project’s goals and requirements.

Time-bound: We set a deadline for resolving the conflict and agreed to compromise on certain aspects of the project plan to accommodate each other’s concerns within the given timeframe.

By employing the SMART method, we were able to navigate the conflict constructively, reaching a mutually satisfactory resolution that allowed us to proceed with the project effectively while preserving our working relationship.

98
Q

Q: What is one example of your work that you were especially proud of, and what is one example of your work that you learned how to improve through?

A

Certainly, here’s a response applying the SMART method:

Specific: One example of work I was especially proud of was leading an IT auditing project for a large financial institution to assess their cybersecurity measures comprehensively.

Measurable: This project involved evaluating various aspects of their IT infrastructure, identifying vulnerabilities, and providing actionable recommendations for improvement.

Achievable: To ensure the success of the audit, I coordinated with different departments, utilized advanced auditing tools, and conducted thorough research on industry best practices.

Relevant: Given the increasing importance of cybersecurity in the financial sector, the project aligned with the institution’s strategic goals of safeguarding sensitive data and maintaining regulatory compliance.

Time-bound: We established a timeline for each phase of the audit, adhering to deadlines to deliver the final report within the expected timeframe.

On the other hand, one example of work that taught me valuable lessons was an IT audit where I underestimated the complexity of a client’s network architecture.

Specific: The audit involved assessing the client’s network security protocols and identifying potential vulnerabilities.

Measurable: However, I encountered challenges in accurately mapping the network topology and overlooked certain critical areas during the initial assessment.

Achievable: To address these issues, I sought feedback from colleagues with expertise in network architecture and invested time in further training on network mapping techniques.

Relevant: Recognizing the importance of thorough preparation and technical proficiency in IT auditing, I applied the lessons learned from this experience to subsequent projects.

Time-bound: I set aside dedicated time for self-improvement and skill development to ensure that similar issues would not arise in future audits.

Through these experiences, I honed my skills as an IT auditor, delivering high-quality work while continuously striving for improvement.

99
Q

What happens to the interest rate with an increase/decrease in money supply?

A
100
Q

What are your biggest and weakest strength?

A

Specific: One of my biggest strengths in IT auditing is my attention to detail and analytical mindset. I excel in meticulously examining complex systems, identifying potential risks, and developing robust audit strategies.

Measurable: This strength has been evident in my ability to consistently produce thorough audit reports that provide actionable insights to enhance cybersecurity measures and mitigate potential threats.

Achievable: I have honed this strength through continuous learning, staying updated on the latest auditing methodologies, technological advancements, and industry regulations.

Relevant: Given the critical importance of accuracy and precision in IT auditing, my attention to detail ensures that audit findings are comprehensive and reliable, facilitating informed decision-making by stakeholders.

Time-bound: I consistently prioritize thoroughness and accuracy in my work, ensuring that audit tasks are completed within designated timeframes without compromising quality.

As for my weakest strength:

Specific: One area where I aim to improve is my ability to effectively communicate technical findings to non-technical stakeholders during audit presentations or discussions.

Measurable: While I am proficient in technical analysis and documentation, I recognize the importance of conveying audit findings in a clear, concise, and understandable manner to stakeholders with varying levels of technical expertise.

Achievable: To address this weakness, I have been actively seeking opportunities to enhance my communication skills through training sessions, workshops, and practice presentations.

Relevant: Effective communication is essential for ensuring that audit recommendations are understood and implemented by stakeholders, ultimately enhancing the effectiveness of cybersecurity measures.

Time-bound: I have set specific goals to regularly practice presenting technical information in a simplified manner, seeking feedback from colleagues and supervisors to track my progress over time.

101
Q

What is your opinion on the current state of monetary policy? Do you feel the Board should maintain a 2.0% inflation target?

A

As of my last update in January 2022, the US monetary policy was characterized by several key elements:

Interest Rates: The Federal Reserve had kept interest rates low, aiming to support economic recovery from the COVID-19 pandemic. The Fed had signaled its intention to maintain this accommodative stance until substantial progress was made towards its goals of maximum employment and inflation averaging around 2%.
Quantitative Easing (QE): The Fed had been conducting asset purchases as part of its QE program, aimed at providing liquidity to financial markets and supporting borrowing and lending activity.
Inflation Targeting: The Federal Reserve had a dual mandate of maximum employment and stable prices. It aimed to achieve an inflation rate of around 2% over the longer run, as measured by the Personal Consumption Expenditures (PCE) price index.
Forward Guidance: The Fed had provided forward guidance on its policy intentions, including its plans for interest rates and asset purchases, to provide clarity to financial markets and economic actors.
However, please note that the specifics of monetary policy can change over time based on economic conditions, Federal Reserve decisions, and broader geopolitical factors. It’s essential to consult the latest information from official sources or financial news outlets for the most up-to-date understanding of the US monetary policy.