CYBR 7300 Ch07 Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Defense Risk Treatment Strategy

The risk treatment strategy that attempts to eliminate or reduce any remaining uncontrolled risk through the application of additional controls and safeguards in an effort to change the likelihood of a successful attack on an information asset; also known as the Avoidance Strategy

2
New cards

Avoidance Strategy

See “Defense Risk Treatment Strategy“

3
New cards

Transference Risk Treatment Strategy

The risk treatment strategy that attempts to shift risk to other assets, other processes, or other organizations.

4
New cards

Mitigation Risk Treatment Strategy

The risk treatment strategy that attempts to reduce the impact of the loss caused by an incident, disaster, or attack through effective contingency planning and preparation.

5
New cards

Acceptance Risk Treatment Strategy

The risk treatment strategy that indicates the organization is willing to accept the current level of residual risk; as a result, the organization makes a conscious decision to do nothing else to protect an information asset from risk and to accept the outcome from any resulting exploitation.

6
New cards

Termination Risk Treatment Strategy

The risk treatment strategy that eliminates all risk associated with an information asset by removing it from service.

7
New cards

Cost Avoidance

The financial savings from using the defense risk treatment strategy to implement a control and eliminate the financial ramifications of an incident.

8
New cards

Cost-Benefit Analysis (CBA)

Also known as an economic feasibility study, the formal assessment and presentation of the economic expenditures needed for a particular security control, contrasted with its projected value to the organization.

9
New cards

Asset Valuation

The process of assigning financial value or worth to each information asset.

10
New cards

Single Loss Expectancy (SLE)

In a cost-benefit analysis, the calculated value associated with the most likely loss from an attack (impact); the product of the asset’s value and the exposure factor.

11
New cards

Annualized Rate of Occurrence (ARO)

In a Cost-Benefit Analysis, the expected frequency of an attack, expressed on a per-year basis.

12
New cards

Annualized Loss Expectancy (ALE)

In a Cost-Benefit Analysis, the product of the annualized rate of occurrence and single-loss expectancy.

13
New cards

Organizational Feasibility

An examination of how well a particular solution fits within the organization’s strategic planning objectives and goals.

14
New cards

Operational Feasibility

An examination of how well a particular solution fits within the organization’s culture and the extent to which users are expected to accept the solution; also known as behavioral feasibility.

15
New cards

Behavioral Feasibility

See “Operational Feasibility“

16
New cards

Technical Feasibility

An examination of how well a particular solution is supportable given the organization’s current technological infrastructure and resources, which include hardware, software, networking, and personnel.

17
New cards

Political Feasibility

An examination of how well a particular solution fits within the organization’s political environment—for example, the working relationship within the organization’s communities of interest or between the organization and its external environment.

18
New cards

Delphi Technique

Named for an oracle in Greece that predicted the future, it’s a process whereby a group rates or ranks a set of information; individual responses are then compiled and returned to the group for repeated iterations until the entire group is satisfied with the result.

19
New cards

Exposure Factor

The percentage loss that would occur from a given vulnerability being exploited.

20
New cards

Factor Analysis of Information Risk (FAIR)

A risk management framework developed by Jack A. Jones that can help organizations understand, analyze, and measure information risk, resulting in more cost-effective information risk management, greater credibility for the InfoSec profession, and a foundation from which to develop a scientific approach to information risk management.

21
New cards

ISO 31000

A Risk Management framework standard that provides a structured methodology for evaluating threats to economic performance in an organization.

22
New cards

Microsoft Risk Management

Microsoft-provisioned security risk management guide that asserts that risk management should be part of a general governance program to allow the organizational general-management community of interest to evaluate the organization’s operations and improve their decision-making. Contains 4 Phases: Assessing risk, Conducting decision support, Implementing controls, & Measuring program effectiveness.

23
New cards

NIST Risk Management Framework (RMF)

A process that organizations can use to frame risk decisions, assess risk, respond to risk when identified, and then monitor risk for ongoing effectiveness and continuous improvement to the risk management process; the intent is to offer a complete and organization-wide approach that integrates risk management into all operations and decisions.

24
New cards

Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Method

An InfoSec risk evaluation methodology that allows organizations to balance the protection of critical information assets against the costs of providing protective and detection controls

25
New cards

Political Feasibility

An examination of how well a particular solution fits within the organization’s political environment—for example, the working relationship within the organization’s communities of interest or between the organization and its external environment.

26
New cards

Qualitative Valuation

A Risk Evaluation method that involves observation and estimations of the value of assets, liabilities, operations, and other “soft” data using subjective judgement on non-quantifiable data.