RISK ANALYSIS AND RISK ASSESSMENT (Video) – Vocabulary Flashcards

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/32

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key terms and concepts from the lecture notes on risk analysis and cybersecurity risk assessment.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

Risk analysis

The process of identifying and evaluating risks (threats and vulnerabilities), their impact and likelihood to make informed management decisions.

2
New cards

Risk

The potential for loss or harm from the combination of a threat exploiting a vulnerability, often shown as a risk level.

3
New cards

Threat

A potential source of harm to an asset (e.g., hackers, natural disasters, human error).

4
New cards

Vulnerability

A weakness that can be exploited by a threat to cause harm to an asset.

5
New cards

Asset

Anything valuable to an organization (physical, digital, people, reputation).

6
New cards

Impact

The consequence if a risk materializes (financial loss, downtime, legal issues, reputation damage).

7
New cards

Likelihood

The probability that a risk event will occur (e.g., Rare, Unlikely, Possible, Likely, Almost Certain).

8
New cards

Risk Matrix

A tool that combines likelihood and impact to determine a risk level and prioritize actions.

9
New cards

Risk management

Proactive control and evaluation of risks, including planning and implementing controls.

10
New cards

Risk communication

Exchange of information about risks among stakeholders to inform decisions.

11
New cards

Risk assessment

The safety/hazard-identification component of risk work, often focusing on hazards and safety.

12
New cards

Business Impact Analysis (BIA)

Study of the effects of disruptions to critical processes to guide recovery planning.

13
New cards

Failure Mode and Effects Analysis (FMEA)

A method to identify possible failures in processes and reduce their impact.

14
New cards

Needs assessment

Structured process to identify gaps and what a business needs to improve.

15
New cards

Root cause analysis

Identify underlying causes of a problem to prevent recurrence.

16
New cards

5 Whys

A root-cause technique that asks why five times to reach the root cause.

17
New cards

8D

Eight Disciplines problem-solving method used in quality management.

18
New cards

DMAIC

Define, Measure, Analyze, Improve, Control; Six Sigma framework for process improvement.

19
New cards

Qualitative risk analysis

Assessment of likelihood and impact using subjective scales (low/medium/high).

20
New cards

Quantitative risk analysis

Uses numerical models to assign monetary values to risks and compute expected costs.

21
New cards

Security controls

Measures to reduce risk, including technical and non-technical controls; preventive or detective.

22
New cards

Preventive controls

Controls designed to prevent incidents from occurring.

23
New cards

Detective controls

Controls that detect incidents as they occur or after they happen.

24
New cards

Monitor and review

Ongoing tracking of risks, updating risk registers, and reassessing risks.

25
New cards

Identify assets

Catalog information assets (data, hardware, software, people) and classify their value/sensitivity.

26
New cards

Identify threats

List threats (human, natural, technical) that could harm assets.

27
New cards

Identify vulnerabilities

Identify weaknesses that threats can exploit.

28
New cards

Assess impact

Determine the financial, legal, operational, and reputational consequences of a risk.

29
New cards

Assess likelihood

Estimate how likely a risk event is to occur.

30
New cards

Risk level

Overall severity of a risk, usually High, Medium, or Low, from likelihood and impact.

31
New cards

Treat the risk

Decide on actions to manage risk: accept, avoid, transfer, or mitigate.

32
New cards

Cybersecurity risk assessment

Risk assessment focused on IT systems and data, guided by threat intelligence.

33
New cards

Threat intelligence

Information about threats and threat actors used to inform risk decisions.