RM1 Flashcards
—- can be classified into different types: strategic, compliance, financial, operational, environmental, technical, and managerial.
Risks
A risk is the likelihood that the threat agent will exploit a ___].
vulnerability
There are different strategies for controlling risk. ____ is the process of assigning and revoking privileges to objects; that is, it covers the procedures of managing object authorizations.
Privilege management
One element of privilege management is periodic reviewing of a subject’s privileges over an object, and is known as ____
privilege auditing.
_____refers to a methodology for making changes and keeping track of those changes.
Change management
Without ____ in procedures, a change may negate or diminish a previous change or even unknowingly create a security vulnerability.
proper documentation
Change management seeks to approach changes systematically and provide the necessary ____] of the changes.
documentation
____ is the framework and functions required to enable incident response and incident handling within an organization.
Incident management
The objective of incident management is to ____ the normal operations as quickly as possible with the least possible impact on either the business or the users.
restore
A security policy is a ____
written document that states how an organization plans to protect the company’s information technology assets.
An effective security policy must carefully balance two key elements, _____.
trust and control
A security policy attempts to provide a balance between ____
no trust and too much trust.
The appropriate level of control is determined by the ____
security needs and the culture of the organization.
A ___] is a collection of requirements specific to the system or procedure that must be met by everyone
standard
_____ is a collection of suggestions that should be implemented.
Guideline