Risk Assessments Flashcards

1
Q

Risk Assessments

A

A process used inside of risk management to identify how much risk exists in a given network or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk

A

The probability that a threat will be realized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vulnerabilities

A

Weaknesses in the design or implementation of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat

A

§ Any condition that could cause harm, loss, damage, or compromise to our information technology systems
§ Threats are external and beyond your control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk Avoidance

A

A strategy that requires stopping the activity that has risk or
choosing a less risky alternative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk Transfer

A

A strategy that passes the risk to a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Mitigation

A

A strategy that seeks to minimize the risk to an acceptable level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Acceptance

A

A strategy that seeks to accept the current level of risk and the costs associated with it if the risk were realized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Residual Risk

A

The risk remaining after trying to avoid, transfer, or mitigate the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Qualitative Risk Analysis

A

o Qualitative analysis uses intuition, experience, and other methods to assign a relative value to risk
o Experience is critical in qualitative analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Quantitative Risk

A

o Quantitative analysis uses numerical and monetary values to calculate risk
o Quantitative analysis can calculate a direct cost for each risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Single Loss Expectancy (SLE)

A

Cost associated with the realization of each individualized threat that occurs

Asset Value x Exposure Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Annualized Rate of Occurrence (ARO)

A

Number of times per year that a threat is realized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Annualized Loss Expectancy (ALE)

A

Expected cost of a realized threat over a given year
ALE = SLE x ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Assessments

A

§ Verify that the organization’s security posture is designed and configured properly to help thwart different types of attacks
§ Assessments might be required by contracts, regulations, or laws
§ Assessments may be active or passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Active Security Assessments

A

Utilize more intrusive techniques like scanning, hands-on testing, and probing of the network to determine vulnerabilities

17
Q

Passive Assessments

A

o Utilize open source information, the passive collection and analysis of the network data, and other unobtrusive methods without making direct contact with the targeted systems
o Passive techniques are limited in the amount of detail they find

18
Q

Security controls are categorized as

A

Physical Controls
Technical Controls
Administrative Controls

19
Q

Physical Controls

A

Any security measures that are designed to deter or prevent unauthorized access to sensitive information or the systems that contain it

20
Q

Technical Controls

A

Safeguards and countermeasures used to avoid, detect, counteract, or minimize security risks to our systems and information

21
Q

Administrative Controls

A

Focused on changing the behavior of people instead of removing the actual risk involved

22
Q

NIST Security Controls Categories

A

Management Controls
Operational Controls
Technical Controls

23
Q

Management Controls (NIST)

A

Security controls that are focused on decision-making and the management of risk

24
Q

Operational Controls (NIST)

A

Focused on the things done by people

25
Q

Technical Controls (NIST)

A

Logical controls that are put into a system to help secure it

26
Q

Preventative Controls

A

Security controls that are installed before an event happens and are designed to prevent something from occurring

27
Q

Detective Controls

A

Used during the event to find out whether something bad might be happening

28
Q

Corrective Controls

A

Used after an event occurs

29
Q

Compensating Control

A

§ Used whenever you can’t meet the requirement for a normal control
§ Residual risk not covered by a compensating control is an accepted risk

30
Q

Types of Risks

A

External Risk
Internal Risk
Legacy Systems
Multiparty
IP Theft
Software Compliance/Licensing

31
Q

External Risk

A

Risks that are produced by a non-human source and are beyond human control

32
Q

Internal Risk

A

Risks that are formed within the organization, arise during normal operations, and are often forecastable

33
Q

Legacy Systems

A

An old method, technology, computer system, or application program which includes an outdated computer system still in use

34
Q

Multiparty

A

A risk that refers to the connection of multiple systems or organizations with each bringing their own inherent risks

35
Q

IP Theft

A

Risk associated with business assets and property being stolen from an organization in which economic damage, the loss of a competitive edge, or a slowdown in business growth occurs

36
Q

Software Compliance/Licensing

A

Risk associated with a company not being aware of what software or components are installed within its network