Section 4: Risk Management Flashcards

1
Q

Risk Management

A

The process of identifying, assessing, and determining how to handle known risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat

A

Potential for unwanted harm to personnel or an organizational asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vulnerability

A

A weakness in an organizational asset that can cause harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk Formula

A

Risk = Threats * Vulnerabilities
A threat with no vulnerability means there’s no risk
A vulnerability without a threat means there’s no risk
Both must exist for there to be a risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIST SP 800-30

A

Guide for Conducting Risk Assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which phase of NIST SP 800-30 involves understanding how the organization reacts to risks?

A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which phase of NIST SP 800-30 involves analyzing organizational assets to discover possible risks?

A

Assess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which phase of NIST SP 800-30 involves determining the best course of action to address a risk?

A

Respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which phase of NIST SP 800-30 is continuous involves verifying the risk response implementation remains compliant and effective?

A

Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Mitigation

A

Reducing the risk to an acceptable level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk Assignment

A

Allocate the risk responsibility to someone else (transfer the risk)
Insurance company for example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk Deterrence

A

Implementing deterrent controls to reduce risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk Avoidance

A

Don’t introduce changes that will increase the level of risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Acceptance

A

The risk exists and you accept the consequences if it occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk Monitoring

A

Verify the risk response implementation remains compliant and effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Deterrent Control

A

Discourage unauthorized actions
Guards, warning banners, etc

17
Q

Preventative Control

A

Stop unauthorized actions
IPS, access control mechanisms

18
Q

Detective Control

A

Discover unauthorized actions
IDS, log review, etc

19
Q

Corrective Control

A

Correct or modify unauthorized actions
Employee reprimand

20
Q

Compensating Control

A

Support other controls
Awareness training, backups, UPS

21
Q

Directive Control

A

Direct compliance with security policy
Security policy, warning signs and messages

22
Q

Recovery Control

A

Recover from an event
UPS, archives, etc

23
Q

A service provider recently identified a range of potential security threats to its critical infrastructure. They aim to implement measures that will not only reduce the likelihood of these risks, but also discourage malicious actors from violating security policies. Which type of risk response would BEST meet this objective?

A

Risk deterrence

24
Q

After a breach, an organization implemented a control designed to stop similar violations from occurring in the future by adjusting system configurations and restricting user privileges. What type of control was MOST likely implemented to mitigate further policy violations?

A

Corrective control

25
Q

NIST SP 800-137

A

Information Security Continuous Monitoring

26
Q

ISO 27004

A

Monitoring, measurement, analysis and evaluation

27
Q

Continuous Monitoring Steps

A

DEFINE strategy based on risk tolerance levels
ESTABLISH metrics, methods, frequencies, scope
IMPLEMENT methods to collect monitoring data
ANALYZE the collected data and REPORT the findings to senior management
RESPOND to known risks using security controls
REVIEW/UPDATE the monitoring program by adjusting strategies to meet the organizational needs

28
Q

NIST IR 7622

A

National Supply Chain Risk Management Practices for Federal Information Systems

29
Q

CNSSD 505

A

Supply Chain Risk Management

30
Q

ISO 28000

A

Specification for security management systems for the supply chain

31
Q

The CISO wants to implement a strategy that provides real-time visibility into the organization’s security posture, while promptly identifying and mitigating risks as they emerge. With high-value assets spread across different geographic regions, what is the MOST effective method to maintain ongoing risk awareness and adapt to evolving threats?

A

Conducting continuous monitoring