Risk Management Flashcards
Refers to the protection of personal or organizational information or information resources from unauthorized access, attacks, theft, or data damage.
Cybersecurity
Anything of value that could be compromised, stolen, or harmed, including information, physical resources, and reputation.
Asset
Any event or action that could potentially cause damage to an asset or an interruption of services.
Threat
The intentional act of attempting to bypass one or more security services or controls of an information system.
Attack
A condition that leaves the system and its assets open to harm — including such things as software bugs, insecure passwords, inadequate physical security, and poorly designed networks.
Vulnerability
A technique that takes advantage of a vulnerability to perform an attack.
Exploit
A countermeasure that you put in place to avoid, mitigate, or counteract security risks due to threats or attacks.
Control
Is a measure of your exposure to the chance of damage or loss. Is often associated with the loss of a system, power, or network and other physical losses. Also affects people, practices, and processes.
Risk
Is something or someone that can take advantage of vulnerabilities.
Threat
Is a weakness or deficiency that enables an attacker to violate the integrity of the system.
Vulnerability
Is damage that occurs because the threat took advantage of the vulnerability.
Consequence
Is typically defined as the cyclical process of identifying, assessing, analyzing, and responding to risks.
Risk Management
The comprehensive process of evaluating, measuring, and mitigating the many risks that pervade an organization.
Enterprise Risk Management (ERM)
Is the property that dictates how susceptible an organization is to loss.
Risk Exposure
Is the security process used for assessing risk damages that can affect an organization.
Risk Analysis