Risk Management Flashcards

1
Q

First Part of a risk assessment

A

Establishing the context - determine basic parameters and identity assets. Explores political and social enviroment in how the organisation operates. Provides baseline for organisations risk exposure. Senior management defines risk apetite and the acceptable level of risk. The last component of the first step is asset identification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Identification

A

A threat is is anything that might hinder or prevent an asset from providing appropriate levels of the key security services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat Sources

A

Natural acts of god, man made, accidental or deliberate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you evaluate human threat sources

A

Motivation, capability, resources, probability, deterence. Previous expierence of attacks needs to be considered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability identification

A

Identify exploitable flaws in organisation. Determines applicability and significance of threat.
Need a combination of threat and vulnerability to create a risk. Outcome should be a list of threats and vulnerabilities with a brief description of how and why they might occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Analyse risks

A

Specify liklihood of occurance of each identified threat . specify concequence should threat occur. Derive overall risk rating to each threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Formula

A

Risk = Probability threat occurs x Cost to Organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Qualatative or Quantatative ratings?

A

Qualatative, as it is hard to determine accurate probabilities and realistic cost concequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Controls

A

Management, Operational, Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Management

A

These are security methods and policies put in place to manage the user and the system’s behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Operational

A

These controls are implemented by people (as opposed to systems) and are designed to improve the security and integrity of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Technical

A

Also known as logical controls, these are safeguards incorporated into computer hardware, software, and firmware that mitigate access to systems and information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk Liklihood

A

Rare (1), Unlikely (2), Possible (3), Likely (4), Almost Certain (5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Concequences

A

Insignificant (1), Minor (2), Moderate (3), Major (4), Catastrophic (5), Doomsday (6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk Level

A

Extreme, High, Medium, Low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk Register

A

Results of risk analysis should be documented. Risks are sorted in decreasing level of order.
Aim of documentation is to provide management with the info to make decisions. Provides evidence a formal risk assessment has been conducted.
Headings are the following: Asset, Threat/Vulnerability, Existing Controls, Liklihood, Concequence, Level of Risk, Risk Priority

17
Q

Judgement about risk treatment

A

Usually risks with higher ratings need action more urgently. however some risks are cheaper, easier and faster to address. Some risks with lower levels should be treated ahead of higher risks based on cost/technicality.

18
Q

Risk Treatment alternatives

A

Risk Acceptance
Risk Avoidance
Risk Transfer
Reduce Concequence
Reduce Liklihood

19
Q

Risk Acceptance

A

Choosing to accept risk levels greater than normal for business reasons

20
Q

Risk Avoidance

A

Not proceeding with an activity or system which creates risk at the cost of convinience or ability

21
Q

Risk Transfer

A

Sharing responsiblity of risk with a third party

22
Q

Reduce Concequence

A

Modifying structure or use of asset to reduce impact

23
Q

Reduce Liklihood

A

implement controls to reduce chance of vulernability being exploited.