Sec+ Chapter 17: Risk Management and Privacy Flashcards
ERM
Enterprise risk management
A formal approach to risk analysis that identifies risks, determines risk severity, and adopts risk management strategies
Threats
Any possible event that can adversely impact the CIA of information or info systems
Vulnerabilities
Weaknesses in a system or control that can be exploited by a threat
Risks
Occurs at the intersection of threat and vulnerability
A threat without corresponding vulnerability and vice versa doesn’t pose a risk
Risk ID process
Identifies threats and vulnerabilities that exist in your operating environment
External risks
Originate from a source outside an org, like hacker groups or former employees
Internal risks
Originate from within an org, like disgruntled employees or partners with access to your network
Multiparty risks
When my data breach involves multiple other entities because our networks are connected together
Legacy systems
Outdated and older systems that don’t receive updates
Must be heavily protected against unpatchable vulnerabilities
IP theft
Intellectual property theft
When a company possesses trade secrets or proprietary info that could compromise a business advantage if disclosed
Software compliance / licensing
Too few licenses means your employees can’t do their job
Too many licenses is a waste of money as they sit unused
Understand exactly what your licensing requirements are and that you’re purchasing and managing them properly
Likelihood of occurrence
Probability that a risk will occur
Magnitude of impact
Impact risk will make if it does occur
Formula for risk severity
Risk severity = likelihood of occurrence * magnitude of impact
Risk assessment
A formalized approach to risk prioritization that allows orgs to conduct their reviews in a structured manner
Quantitative risk assessment
Numeric data for straightforward prioritization of risks
Qualitative risk assessment
Subjective judgements and categories for risks that are difficult to quantify
Quantitative risk assessment process
1) Determine asset value (AV) of affected asset
2) Determine the likelihood the risk will occur
3) Determine the amount of damage that will occur to the asset if the risk materializes
4) Calculate the single loss expectancy (SLE)
5) Calculate the annualized loss expectancy (ALE)
ARO
Annualized rate of occurrence
The number of times a risk is expected each year
EX: If a risk is expected twice a year ARO = 2.0
EX: Once every hundred years ARO = 0.01
EF
Exposure factor
The percentage of the asset expected to be damaged
EX: EF of a risk that completely destroys an asset = 100% / half = 50% / etc