Week 2 Flashcards

1
Q

What is systemic risk?

A

Systemic risk refers to the risk of a breakdown of an entire system rather than simply the failure of individual parts.

Systemic risk is the risk of having not just statistically independent failures, but interdependent, so-called ‘cascading’ failures in a network of N interconnected system components (Helbing 2013; p 51)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to calculate risk?

A

Likelihood x impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 risk mitigation options?

A

Avoid

Reduce

Transfer

Accept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain Risk Appetite

A

Risk appetite is the level of risk that an organization is prepared to accept in pursuit of its objectives, before action is deemed necessary to reduce the risk. Risk appetite is subjective, someone who wants to keep costs low might think that with amount X spent on security, a lot of risk is covered (A). He/she is optimistic. The CIO, who needs his assets to be secure, might think that with the same amount X, fewer risks have been covered (B). He/she is pessimistic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are organizational, procedural and technical security controls?

A
  • Organizational: function, role, task (segregation of duties)
  • Procedural: verification; workflow
  • Technical: basic security (separate networks, firewalls, routers, encryption techniques), access control, logging and monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name & explain the 4 elements of access control

A
  • Identification: unique way of identifying an entity (e.g. login)
  • Authentication: proof of identity (e.g. password)
  • Authorization: rights (read, write, execute) of person in role
  • Nonrepudiation: receiver can’t deny receipt of message
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain IAM

A

“Identity and access management (IAM) is the discipline that enables the right individuals to access the right resources at the right times for the right reasons.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is segregation of duties?

A

segregation of duties is the concept of having more than one person required to complete a task (two consecutive steps in a business process). In business the separation by sharing of more than one individual in one single task is an internal control intended to prevent fraud and error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 lines of defense?

A

In the Three Lines of Defense model, management control is the first line of defense in risk management, the various risk control and compliance oversight functions established by management are the second line of defense, and independent assurance is the third. Each of these three “lines” plays a distinct role within the organization’s wider governance framework.

The Three Lines of Defense model distinguishes among three groups (or lines) involved in effective risk management:

  • Functions that own and manage risks.
  • Functions that oversee risks.
  • Functions that provide independent assurance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Security Operations Center (SOC)?

A

A SOC (Security Operations Center) is related to people, processes and technologies that provide situational awareness through the detection, containment, and remediation of IT threats. A SOC will handle, on behalf of an institution or company, any threatening IT incident, and will ensure that it is properly identified, analyzed, communicated, investigated and reported. The SOC also monitors applications to identify a possible cyber-attack or intrusion (event), and determines if it is a genuine malicious threat (incident), and if it could affect business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly