Section 6 Risk Identification Flashcards

1
Q

What is Risk Identification?

A

Process of finding, recognizing and describing risk

Note1: Invloves the identication of risk sources, events, thier effects, and consequences.

Note2: can invlove historical data, theroretical anaylsys, and expert opinion, and interested partie’s needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk Identification Activities

A

3.1 Determine the risk identification approach
3.2 Identification of Information security Risk
3.3 Identify Risk Owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3.1 Determine the risk identification approach

What are the two commoly used approach to perform risk identification?

A

event-based
asset-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: Aggregation of risks should not be undertaken unless they are relevant to each other at the level at which the organization’s context is being considered. It can be necessary to consider separately risks which are merged for the purpose of overall risk management budgeting, when planning treatment options, as different controls can be needed to manage them.

A

TRUE: The statement is saying that combining or aggregating risks should only be done if those risks are related to each other in the context of the organization. However, even if risks are combined for things like budgeting and overall risk management, it might still be important to separately consider these risks when planning how to deal with them. This is because different strategies or controls may be needed to manage each individual risk, even if they are grouped together for some administrative purposes.

However, when it comes to actually dealing with these risks and making plans to manage them, it might be necessary to look at each risk separately. This is because each type of risk may require different strategies or actions to handle it effectively.

For instance, if you’re dealing with the risk of a data breach (cybersecurity) and the risk of a lawsuit (legal), you might need different measures for each. You may need to invest in better cybersecurity tools for one and maybe get legal advice or insurance for the other. So, even though you aggregated them for budgeting purposes, you still need to think about and manage each risk individually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is asset-based approach?

A
  • Identifies threats and vulnerabilities specific to individual assets (data, hardware, software, etc.).
  • Assocoiate risk with Assets
  • Identify RISK through an analysis of assets, threats and vlunerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is event-based approach?

A

Identify Risk through establishment of risk scearios.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a risk scenario?

A
  • Risk scenario is the description of a risk exploiting a weakness
  • It helps you visualize how a risk could understand its consequences.
  • Describes a potential threat to an organization or its assets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the Information Gathering Techniques?

A
  1. Observe (on-site process, personnel, operation)
  2. Questionares (send questionares to interested parties)
  3. Interview (Interview different levels of individuals)
  4. Review Documented Information (review processes, procedures, description of controls, or reports, priveous audit reports)
  5. Scan Tool (scan for vulnerabilities and establish lists of assets)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the aim of Risk Identification?

A

To generate a list of risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which asset category do event-based approaches utilize to identify events and their consequences?

A

Primary (business) assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What components should be considered when identifying and assessing information security risks?

A

components related to the past
components related to the future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the examples of components related to the past?

A

components related to the past:
- security events and incidents (both inside the - organization and outside);
- risk sources;
- exploited vulnerabilities;
- measured consequences;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the examples of components related to the future?

A

components related to the future:
- threats;
- vulnerabilities;
- consequences;
- risk scenarios.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly