Risk Assessment Process Flashcards

1
Q

is to enable organization executives to determine an appropriate budget for security and, within that budget, implement security controls to optimize the level of protection

A

risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This objective is met by providing an estimate of the potential cost to the organization of security breaches, coupled with an estimation of the likelihood of such breaches.

A

risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An item of value to the achievement of organizational mission/business objective.

An .. may be specifically related to information processing, including any data, device, or other components of the environment that support information-related activities that can be used, disclosed, altered, destroyed, and/or stolen, resulting in a loss.

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The magnitude of the potential of a threat event to impose a cost on an organization.

A

Threat severity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Also referred to as threat capability, the probable level of force that a threat agent can apply against an asset.

As an example, consider an adversary attempting to obtain root privileges on a server. With root privileges, the adversary may able to read, alter, or delete files and may be able to encrypt files for ransomware.

A

Threat strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Other word for threat strength

A

Threat capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The probably frequency, within a given time frame, that a threat agent will act against an asset.

A

Threat event frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A safeguard or countermeasure prescribed for an information system or an organization designed to protect the confidentiality, integrity, and availability of its information and meet a set of defined security requirements.

A

Security control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, loss of information or information system availability.

A

Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A measure of the extent to which an entity is threatened by a potential circumstance or event

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The magnitude of risks or a combination of risks, expressed in terms of the combination of consequences and their likelihood.

A

Level of risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Also called lost event frequency, the probable frequency, within a given time frame, that a threat agent will inflict harm upon an asset.

A

Likelihood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly