Risk Management Flashcards
What are the 4 risk response techniques available to an organization?
Avoid, transfer, mitigate, accept
Quantitative risk assessment
Measures risk using a specific monetary amount
SLE
Single loss expectancy
The cost of any single loss
ARO
Annual Rate of Occurrence
Indicates how many times the loss may occur in one year (if less than 1, it’s represented as a %)
ALE
Annual Loss Expectancy
The value of the SLE x ARO
Qualitative Risk Assessment
Uses judgement to categorize risks based on likelihood of Occurrence (probability) and impact. Often represented as numbers (scale of 1 to 5, etc)
Impact
The magnitude of loss/harm resulting from a risk
Supply Chain Assessment
An assessment that evaluates the elements used in an organization to create, sell, and distribute products.
Risk Register
A comprehensive document that lists known information about identified risks. Usually includes risk scores and recommended security controls to reduce those scores.
What is Risk?
The likelihood that a threat will exploit an organizational vulnerability.
What is a Threat, in context of Risk Management?
Any circumstance/event that can compromise the confidentiality, integrity, or availability of a system or data.
Threat Assessment
Helps an organization to identify + categorize threats by predicting what threats exist against an organization’s assets along with the likelihood that the threat will occur.
What is Risk Management?
The practice of identifying, monitoring, and limiting risks to a manageable level.
What is the primary goal of a Vulnerability Assessment?
To assess the security posture of a systems and networks.
What methods do network scanners use to gather information about hosts on a network?
Ping scan/Ping sweep, ARP ping scan, Syn stealth scan (TCP 3-way handshake), Port scan (to determine open ports, Service Scan, OS detection (TCP/IP fingerprinting)