Objective 5.4 - Risk Management Processes and Concepts

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/45

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

46 Terms

1
New cards

Risk types: External

any risks from outside an organization. This includes and threats from external attackers It also includes and natural threats, such as hurricanes, earthquakes, and tornadoes. Sometimes predictable, often not.

2
New cards

Risk Types: Internal

any risks from within an organization. This includes employees and all the hardware and software used within the organization. These risks are generally predictable and can be mitigated with standard security controls.

3
New cards

Risk Types: Legacy Systems

The primary risk is that vendors do not support these systems. If vulnerabilities become known, the vendor doesn't release patches, and anyone using the system is at risk.

4
New cards

Risk Types: Multiparty

occur when an organization contracts with an external organization for goods or services. If the third-party suffers an attack it may expose the contracting organization to additional threats.

5
New cards

Risk Types: IP theft

Intellectual Property (IP) includes things like copyrights, trademarks, patents, and trade secrets. Intellectual Property is valuable to an organization and IP theft represents a significant risk.

6
New cards

Risk Types - Software Compliance/Licensing

If individuals or organizations use software without buying a license, the development company loses money. Similarly, an organization can lose money if it buys licenses but does not protect them.

7
New cards

Risk Management Strategies

- Acceptance

- Avoidance

- Transference

- Mitigation

8
New cards

Acceptance

When the cost of a control outweighs the risk, an organization will often accept the risk.

9
New cards

Avoidance

An organization can avoid a risk by not providing a service or not participating in a risky activity.

10
New cards

Transference

The organization transfers the risk to another entity or at least shares the risk with another entity. The most common method is by purchasing insurance.

11
New cards

Mitigation

The organization implements controls to reduce risks. These controls either reduce the vulnerabilities or reduce the impact of the threat.

12
New cards

Cybersecurity Insurance

helps protect businesses and individuals from losses related to cybersecurity incidents such as data breaches and network damage.

13
New cards

Risk Analysis

identifies potential issues that could negatively impact an organization's goals and objectives.

14
New cards

Risk register

Lists all known risks and their source, an estimation of unknown risks and the response to be taken to each risk.

15
New cards

risk matrix/heat map

A graphical table indicating the likelihood and impact of risk factors identified for a workflow, project, or department for reference by stakeholders.

16
New cards

Risk control assessment

examines an organization's known risks and evaluates the effectiveness of in-place controls.

17
New cards

Risk Control Self-Assessment

A risk control assessment but employees perform it.

18
New cards

Risk Awareness

the practice of identifying, monitoring, and limiting risks to a manageable level. It doesn't eliminate risks but instead identifies methods to limit or mitigate them.

19
New cards

Inherent Risk

refers to the risk that exists before controls are in place to manage risk

20
New cards

Residual Risk

is the amount of risk that remains after managing or mitigating risk to an acceptable level. Senior management is ultimately responsible for residual risk and they are responsible for choosing the acceptable level of risk based on the organization's goals.

21
New cards

Control Risk

refers to the risk that exists if in-place controls do not adequately manage risks. Imagine systems have antivirus software installed, but they don't have a reliable method of keeping it up to date. Additional controls are needed to manage this risk adequately.

22
New cards

Risk Appetite

refers to the amount of risk that an organization is willing to accept. This varies between organizations based on their goals and strategic observations.

23
New cards

Regulations that affect risk posture

HIPPA, GBLA, SOX, GDPR

24
New cards

Risk Assessment Types

Qualitative risk analysis and quantitative risk analysis

25
New cards

Qualitative Risk Assessment

A risk assessment that uses judgment to categorize risks. it is based on impact and likelihood of occurrence.

26
New cards

Quantitative Risk Assessment

A risk assessment that uses specific monetary amounts to identify cost and asset value. It then uses the SLE and ARO to calculate the ALE.

27
New cards

likelihood of occurrence

The probability that something will occur. It is used with impact in a qualitative risk assessment. Compare with impact.

28
New cards

Impact

The magnitude of harm that could be caused by a threat's exercise of a vulnerability.

29
New cards

Asset Value

An element of a risk assessment. It identifies the value of an asset and can include any product, system, resource, or process. The value can be a specific monetary value or a subjective value.

30
New cards

Single Loss Expectancy (SLE)

Expected monetary loss every time a risk occurs; calculated by multiplying asset value by exposure factor.

31
New cards

Annualized Loss Expectancy (ALE)

Expected monetary loss for an asset due to a risk over a one-year period; calculated by multiplying single loss expectancy by annualized rate of occurrence.

32
New cards

Annualized Rate of Occurrence (ARO)

In a cost-benefit analysis, the expected frequency of an attack, expressed on a per-year basis.

33
New cards

Disasters: Environmental

This can include natural disasters, such as hurricanes, floods, earthquakes, and tornadoes. It can also include things like fires caused by lightning strikes rather than by humans.

34
New cards

Disasters - Person-made

refer to disasters caused by human activity. This includes fires and train wrecks cause by human error. Within an organization, human error can cause software and hardware failures and data loss. Attacks are also person-made

35
New cards

Disasters: Internal vs. external

Internal: occurs within an organization. For instance, a fire within a data center

External: Occurs outside of the organization but impacts the organization. For instance, a wildfire which takes down power lines and disrupts power to a data center

36
New cards

Business Impact Analysis (BIA)

A process that helps an organization identify critical systems and components that are essential to the organization's success.

37
New cards

Recovery Time Objective (RTO)

the maximum tolerable time to restore an organization's information system following a disaster, representing the length of time that the organization is willing to attempt to function without its information system

38
New cards

Recovery Point Objective (RPO)

The point in time to which data must be restored in order to successfully resume processing.

39
New cards

Mean Time to Repair (MTTR)

The average amount of time a computer repair technician needs to resolve the cause of a failure through replacement or repair of a faulty unit.

40
New cards

Mean Time Between Failures (MTBF)

A statistical value that is the average time until a component fails, cannot be repaired, and must be replaced.

41
New cards

Functional Recovery Plans

42
New cards

single point of failure

A component or entity in a system which, if it no longer functions, would adversely affect the entire system.

43
New cards

Disaster Recovery Plan (DRP)

a plan to restore an organization's IT capability in the event that its data center is destroyed

44
New cards

Mission-Essential Functions

refer to functions that need to be immediately functional at an alternate site until normal operations can be restored.

45
New cards

Identification of critical systems

Distinguishing important functions that make up the mission-essential functions in an organization.

46
New cards

Site Risk Assessment

The assessment of all risks and hazards that could happen at a particular site. Includes spillage of chemicals, power outages, loss of health and safety certificates, etc.