Risk Management Fundamentals Flashcards

1
Q

Risk management

A

Risk management is the practice of identifying assessing controlling and mitigating risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threats

A

A threat is an activity that represents a possible danger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset

A

An asset is a thing of value worth protecting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability

A

A vulnerability is a weakness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Impact of loss

A

Impact of loss is a loss resulting in a compromise to business functions or assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Business functions

A

Business functions or the activities a business performs to sell products or services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Denial of service attack DOS

A

An organization received several emails that are unrelated to business functions, which temporarily clog up email space and make that work resources unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social engineering

A

A person calls an organization pretending to have a legitimate purpose and attempts to trick someone in the organization into divulging personal or protected information. This is a form of impersonation which can compromise the organizations business functions and lead to losses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is CIA?

A

Confidentiality integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tangible value

A

Tangible value is the actual cost of the asset and can be expressed in the monetary terms such as $5000.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is considered tangible?

A

Computer systems, network components, software applications, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is intangible value?

A

Intangible value is value that cannot be measured by cost such as client confidence or company reputation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is GAAP?

A

GAAP is generally acceptable accounting principles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the equation for loss in this Chapter?

A

The equation for loss is lost revenue plus repair costs equals total tangible value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is future lost revenue?

A

Future lost revenue is any additional purchases customers make with another company or a loss to the company whose website was down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is cost of gaining the customer?

A

Large sums of money or invested in attracting customers a repeat customer is much easier to sell then to acquiring a new customer. If a company loses a customer, the company’s investment is lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is customer influence?

A

Customers have friends, families, and business partners. They commonly share their experience with others, especially if the experience is exceptionally positive or negative.

18
Q

What is reputation?

A

Customers share their negative experience with others, so when customers bad experience could potentially influence other current or potential customers to avoid future business transactions.

19
Q

What is impact?

A

The impact is the amount of loss, which can be expressed in monetary terms, such as $5000.

20
Q

What are the levels of impact?

A

The levels of impact are very high, high, moderate, low, and very low.

21
Q

What guide includes the scale for assessing the impact of threats to the businesses assets?

A

National Institute of standards and technology, the guide for conducting risk assessments. (NIST SP 800-30)

22
Q

What is an organizations weakest link?

A

And organizations weakest link is the organizations employees.

23
Q

What is a leaders and managers perception of risk?

A

Leaders and managers are concerned mostly with profitability and survivability.

24
Q

What is the perception of risk for system administrators?

A

System administrators are responsible for protecting IT systems. When they understand the risks, they often want to lock systems down as tight as possible. Administrators are often highly technical individuals. Sometimes they lose sight of the need to balance security costs with profitability. They often view the security controls as hindrances to performing their job and don’t always recognize the importance.

25
Q

What is a developers concern and perception of risks?

A

Some companies have in-house application developers. They write applications that can be used in health or sold as a part of the company‘s product offerings. Many developers have adopted a secure computing mindset. They realize that security needs to be included beginning at the design stage and going all the way through the release stage. When developers having adopted a security mindset,They often try to patch security holes at the end of the development cycle. This patching mindset really addresses all of the problems and results in the release of vulnerable software. Ideally, security needs to be an integral step in the lifecycle of software or application development.

26
Q

What is the end-users perception of risk?

A

The end-users simply want the computer to work for them. They are mostly concerned with usability and don’t often understand the reason for the security controls and restrictions. Instead, security is viewed as an inconvenience. Well-meaning users often try to circumvent controls so they can accomplish their job.

27
Q

What properly defines risk?

A

Threat times vulnerability

28
Q

What properly defines total risk?

A

Threat times vulnerability times asset value

29
Q

Is it true or false that the best bet is to reduce risk to a level that can be accepted?

A

True

30
Q

What are the two accurate pairings of threat categories?

A

External and internal. Intentional and accidental.

31
Q

A loss of client confidence or public trust is an example of what kind of loss?

A

It is intangible loss.

32
Q

What is used to reduce a vulnerability?

A

Control is used.

33
Q

True or false. As long as a company is profitable, it does not need to consider survivability.

A

False.

34
Q

What is the primary goal of an information security program?

A

To eliminate losses related to employee actions

35
Q

What is an industry recognize standard list of common vulnerabilities?

A

Mitre CVE

36
Q

Which of the following is a goal of risk management?

A

To identify the correct cost balance between risks and controls.

37
Q

If the benefits outweigh the cost, the control is implemented. Costs and benefits are identified by completing a what?

A

Cost benefit analysis

38
Q

What can be done to manage risk?

A

Except it, transfer it, avoid it.

39
Q

After controls to minimize risk in the environment have been applied, what is the remaining risk called?

A

Residual risk

40
Q

Who is ultimately responsible for losses resulting from residual risk?

A

End users