3. Information risk management

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

Risk - Definition

Risks exists at the intersection of a threat and a corresponding vulnerabilidy

2
New cards

Vulnerability

A scan identifies a server exposing its TCP port 22 to the outside world, enabling brute-force attacks

3
New cards

Thread

Attacker with brute-force scanning tool

4
New cards

Risk identification

Requires identifying the threats and vulnerabilities tha exist in your operating environement

5
New cards

Types of risk

  • External risks

  • Internal risks

  • Multiparty risks

  • Legacy systems (posing unique type of risk to the organization)

  • Intellectuals property theft risks

  • Software compliance/licensing risks

6
New cards

External risks

Those risks that originate from source outside the organization including

  • cybersecurity adversives,

  • malicious code,

  • and natural disasters

among my other type of risk

7
New cards

Internal risks

Risks that originate from within the organisation such as

  • malicious insiders

  • mistakes made by authoried users

  • equipment failures

and similar risks

8
New cards

Multiparty risks

Risks that impact more than one organizations. For e.g.

  • power outtage to a city block

  • compromise of SaaS providers database (results in compromising the information of multiple customers)

9
New cards

Legacy systems

Unitque type of risk to the organization. Outdated systems do often not receive any further software updates and cybersecurity professionals must take extraordinary measures to protect such systems agains unpatchable vulnerabilities

10
New cards

Intellectual property theft

Information compromising the organization’s business advantages if disclosed

  • Trade secrets

  • Other properitary information

11
New cards

Software compliance / licensing risk

When an organizations licenses software intenionally or accidentialy run afoul of usage limitations that expose the organization to financial and legal risk

12
New cards

Risk calculation

Consists of two different factors:

  • likehood of occurence

  • magnitude of impact

13
New cards

Likehoof of occurence

Probability, that the risk will occur. Expressed as percentage of chance that the threat will exploit a vulenrability over a specified period of time

14
New cards

Magnitude of impact

The height of financial costs for the organization if this risk occurs

15
New cards

Risk severity

=Likehood x Impact

16
New cards

Risk assessment

Formalized approach to risk prioritization that allows to conduct risk reviews in structured order (priorization)

17
New cards

Risk assessment methodologies

  • Quantitative risk assessment

  • Qualitative risk assessment

18
New cards

Quantitative risk assessment

A structured approach to evaluating risks using numerical values and statistical methods to measure the likelihood and potential impact of risks.

19
New cards

Qualitative risk assessment

A method of assessing risks based on subjective judgment, descriptions, and categorical ratings rather than numerical values. It helps identify and prioritize risks based on their characteristics.

20
New cards

Quantitative risk assessment methodology

  • Determine the asset value (AV) - Expressed in dollars or other currencies

  • Determine the likehood the risk will occur - The number of times the risk is expected to happen each year (annual rate of occurece - ARO)

  • Determine the amount of damage that will occur to the asset if the risk materializes. This is known as the exposure factor (EF) and is expressed as the percentage of the asset expected to be damaged.

  • Calculate the single loss expectancy. The single loss expectance (SLE) is the amount of financial damage expected each time this specific risk materializes / happens (AV x EF)

  • Calculate the annualized loss expectancy. The annualized loss expectancy (ALE) is the amount of damage expected from a risk each year (SLE x ARO)

21
New cards

Qualitative Risk Assessment

Quantitative risk assessments techniques seek to overcome the limitations of quantitatvie techniques by substitutiing subjective judgement for objective data. They use still the same probability and magnitude factors to evaluate severity of a risk but so so using subjective categories to assess likelihood and impact based on expert opinion and experience. For e.g. "high," "medium," "low" ratings. This is used were it is not possible to directly calculate the financial impact of a risk.

22
New cards

Risk reassessment

The process of regularly reviewing and evaluating risks to ensure that the risk management strategy remains effective. This involves updating risk analyses, considering any changes in the environment or organizational structure. Organizations should maintain as set of Key Risk Indicators (KRI) that facilitate risk monitoring. These KRI’s are quantitative measures of risk that may be easily monitored for situations where they exceeded a defined threshold value or worrisome trends.

Reassessment should take place whenever KRI’s or other factors suggest that the reassessment is undergoing a significant change.

23
New cards

Risk treatment

Risk treatment is the process of systematically responding to the risk facing an organization.

24
New cards

Risk assessment provides two important roles in the risk management process

  1. The risk assessment provides guidance in prioriitizing risks so that the risk with highest probability and magnitude are addressed first

  2. Quantitative risk assessments help determine whether the potential impact of a risk justifies the costs incurred ba adopting a specific risk approach

25
New cards

Risk management strategies

  1. Risk mitigation

  2. Risk avoidance

  3. Risk transference

  4. Risk accpetance

26
New cards

Risk mititgation

Is the process of applying security controls to reduce the probability and/or magnitude of a risk. Risk mitigation is the most common strategy in risk management

Each of the applied security controls should

  • reduce the probability a risk will materialize

  • reduce the magnitude a risk if it occurs

  • or both the probability and hte magnitude

27
New cards

Risk avoidance

The risk management strategy by which we change the business practice to completely eliminate the potential that a risk will materialize. Risk avoidance strategies typically have a serious detrimental impact on business operations or objectives.

28
New cards

Risk transference

Shifts some of the impact of a risk from the organization experiencing the risk to another entity. The most common example is purchasing a insurance policy that covers a risk.

29
New cards

Risk acceptance

Risk accpetance is the final risk management strategy, and it boils down to deliberately choosing to take no other risk management strategy and to simply continue operations as normal in the face of the risk. A risk acceptance approach may be warranted if the cost of mitigation a risk is greater then the impact of the risk itself.

30
New cards

Risk analysis

  • The inherent risk facing an organization is the original level of risk that exists before implementing any controls

  • The residual risk is the risk that remains after controls are applied to mitigate, avoid and/or transfer the inherent risk.

  • The risk appetite is the level of risk that the organization is willing to accept as a cost of doing business

An organiztion begins with its inherent risk and then implement risk management strategies to reduce that level of risk. It continues doing sountil the residual risk is at or below the oganizations risk appetite

31
New cards

Control Risk

The world of public accounting brings us the concept of control risk. Control risk is the risk that a company's internal controls will not prevent or detect material misstatements in financial reporting. Information technology risks contribute to control risks if they jeopardize the integrity or availability of financial information. For this reason, financial audits often include tests of the controls protecting financial systems.

32
New cards

Risk matrix / Risk heat map

  • Used to communicate risk management concepts to senior leaders

  • Quickly summarizes risks and allows senior leaders to quickly focus on the most critical risks facing the organization and how those risks might impact organizational goals and objectives.

  • The matrix categorizes risks based on their likelihood and impact, helping prioritize risk mitigation efforts.

33
New cards

Enterprise Risk Management

As organizations seek to adopt a systematic approach to enterprise risk management, they should work to integrate risk management practices into normal business and information technology processes. Mature organizations don’just treat risk management efforts as siloed projects but rather as integral components of their day-to-day work. For e.g. the following areas should incoporate risk management

  • Software and systems development: New and modified systems are a potential source of risk to the organization. Integrating risk assessment and response practices help ensure that the organization integrates security from the start and does not need to “bolt on” security controls after the fact in a costly and error-prone approach

  • Procurement: Any new or renewing realtionship with a vendor should include a formal risk assessment that identifies potential risks associated with the realtionship and implements appropriate risk treatments

  • Project management: Project management procedures should incorporate risk assessments that identify new or changed risks that arise during the course of a project and address them appropriately

34
New cards

Disaster recovery planning

The disaster recovery planning process creates a formal, broad disaster recovery plan for the organization and, when required, devlops specific functional recovery plans for critical business functions. The goal of these plans is to help the organization recover normal operations as quickly as possible in the wake of disruption

35
New cards

Disaster types

  • Natural environment disaster (flood, hurricane, earthquake)

  • Human origin of external disasters (terrorism, cyber attack) but also internal to the organization

From a disaster recovery planninf perspective, a disaster is any event that has the potential to disrupt an organizations business

36
New cards

Business Impact Analydids

The Business Impact Analysis (BIA) is a formal process designed to identify the mission essential functions within an organization and facilitate the identification of the critical systems that support those functions:

  • MTBF: Mean time between failures is a measure of realiability of a system. It is the expected amount of time that will elapse between system failures

  • MTTR: The mean time to repair is the average amount of time to restore a system to its normal operating state after a failure

  • RTO: Recovery Time Objective is the amount of time that the organization can tolerate a system being down before it is repaired. Expectations are meet when the time to repair is less than the RTO

  • RPO: Recovery Point Objective defines the maximum acceptable amount of data loss measured in time. It indicates how far back in time data must be restored after a failure to minimize impact on the organization.

37
New cards

Single point of failure

As organizations evaluate the state of their environment, they should pay particular attention to single point of failures.A single point of failure (SPOF) refers to a component or aspect of a system whose failure would lead to the failure of the entire system, emphasizing the need for redundancy and risk mitigation strategies in planning.

For examples

  • Only on power supply

  • A single server providing the organizations web page