Risk Management and Control Flashcards

1
Q

What is risk?

A
  1. Future
  2. Asset
  3. Objectives or Goals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a cyber-risk?

A

Risk that is caused by a cyber threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is new in the modern viewpoint on risk?

A

Effect can be positive or negative!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the steps in the Risk Management Cycle?

A
  1. Establish the context
  2. Identify the risks
  3. Analyse the risks
  4. Evaluate the risks
  5. Treat the risks
  6. Communication and consultation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why risk management may fail?

A
  1. Limitations of scope
  2. Lack of top management support
  3. Did not engage all stakeholders
  4. Failure to share information
  5. Risk management not embedded within planning & management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three components of the ISO 31000 for Risk Management?

A
  1. Principles
  2. Framework
  3. Process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the extra step in the risk management process compared with the Risk Management Cycle?

A
  1. Monitoring and review
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the steps in the Risk Management Framework?

A
  1. Design of management framework
  2. Implement Risk Management
  3. Monitoring & Review
  4. Continual Improvement
  5. Mandate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do the Risk Management Framework, Risk Management Process and Risk Management Principles fit together?

A

Principles + Framework = Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between classical access control and RBAC?

A

In RBAC, the access to objects is based on the user’s role, while in classical access control access is based on the user itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What steps do we take in a cybersecurity risk assessment?

A
  1. Characterise the system
  2. Identify the threats
  3. Determine inherent risk and impact
  4. Analyse the control environment
  5. Determine a likelihood rating
  6. Risk assessment matrix
How well did you know this?
1
Not at all
2
3
4
5
Perfectly