Risk Management

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:22 AM on 5/2/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

37 Terms

1
New cards

An incident where an unauthorized party successfully gains access to systems, networks, or sensitive data.

Breach

2
New cards

Discovering potential threats and vulnerabilities that could harm an organization before they are exploited

Risk identification

3
New cards

A quick, informal risk evaluation performed when an unexpected issue or change occurs, rather than as part of a scheduled process. Occurs only when needed/on the spot.

Risk assessment - Ad Hoc

4
New cards

Type of risk assessment that is conducted at regular intervals, such as quarterly or annually.

Risk assessment - Recurring

5
New cards

Are conducted for specific scenarios, such as before launching a new product, or implementing a new IT system. They are focused and are typically not repeated, unless there are significant changes to initial condition conditions.

Risk assessment - One-Time

6
New cards

Involves ongoing monitoring and analysis of the risk of landscape. Uses real-time data and automated tools to constantly evaluate risk levels. It is extremely important as technology continues to advance.

Risk assessment - Continuous

7
New cards

The process of measuring risk using numerical values (money, percentages, or probabilities) to calculate the potential impact of a threat.

Quantitative

8
New cards

Dollar value of an asset.How much something is worth to the company in money terms.

Asset Value (AV)

9
New cards

The percentage of loss that an organization would experience if a specific asset were violated.

Exposure factor

10
New cards

The estimated monetary loss an organization would suffer if a single security incident occurs and an asset is fully or partially compromised.

Single loss expectancy (SLE)

11
New cards

Asset Value (AV) × Exposure Factor (EF)

What is the formula for Single loss expectancy (SLE)

12
New cards

The expected frequency with which a specific threat or risk will occur within a single year.

Annualized rate of occurrence (ARO)

13
New cards

It calculates the expected total yearly financial loss from a specific risk or threat based on how often it happens.

Annualized loss expectancy (ALE)

14
New cards

Single Loss Expectancy (SLE) × Annual Rate of Occurrence (ARO)

What is the formula for Annualized loss expectancy (ALE)

15
New cards

Involves assessing risks based on subjective criteria (opinions), such as expert opinions, scenario analysis, and industry best practices. Typically categorize his risks into levels, such as low, medium, or high based on their perceived severity and likelihood.

Qualitative

16
New cards

A document or tool used to record, track, and manage identified risks, including their likelihood, impact, priority, and mitigation plans.

Risk Register

17
New cards

Are metrics used to measure and monitor the likelihood and impact of risks. They provide early warning signs that a risk may be increasing or decreasing in severity.

Key risk indicators (KRI)

18
New cards

Someone in a management role who has the authority and knowledge to implement risk responses. It is someone who is responsible for managing and mitigating that specific risk.

Risk Owners

19
New cards

The level of risk an organization is willing to accept before it takes action to reduce, avoid, or mitigate that risk.

Risk threshold

20
New cards

Refers to the risk that an organization is prepared to pursue, retain, or take in its operations. It reflects the organizations attitude towards risks and is shaped by factors like business goals, or market conditions, etc. Think “How spicy you like your food overall”

Risk appetite

21
New cards

Is the amount of risk the organization is willing to take before action is required. Think “How much spice you can handle in this specific meal before stopping.”

Risk tolerance

22
New cards

Indicates a willingness to take on higher levels of risk and pursuit of greater rewards. Organizations with this appetite are often in growth, phases, seeking competitive advantage, and willing to invest in new opportunities.

Expansionary Risk appetite

23
New cards

This appetite implies a preference for lower risk and a focus on stability and predictability. Organizations with this appetite, prioritize, protecting assets and minimizing potential losses over seeking high risk opportunities.

Conservative Risk appetite

24
New cards

This appetite strikes a balance between expansionary and conservative approaches. Organizations with this appetite are willing to accept some level of risk for reasonable returns, but are not inclined to pursue high risk opportunities.

Neutral Risk appetite

25
New cards

Involves changing plans or procedures to eliminate the risk or to remove the organizations exposure to it. This might mean, not implementing a certain system or technology that introduces high risk.

Risk Avoidance

26
New cards

Refers to taking steps to reduce the likelihood or impact of a risk. This can involve implementing security controls, updating software, and improving user training. However, it doesn't necessarily remove the risk completely.

Risk Mitigation

27
New cards

This means shifting the impact of a risk to a third-party. This often is done through insurance policies, where a company transfers, the financial risk to an insurance provider or through outsourcing where certain IT services or processes are managed by external vendors.

Risk Transfer

28
New cards

Is a conscious decision to not take any action at all against a particular risk. This strategy is chosen when the cost of mitigating the risk is greater than the potential loss from the risk itself or if the likelihood of the risk is low.

Risk Acceptance

29
New cards

A rule does NOT apply to you at all from the start.

Exemption

30
New cards

The rule normally applies, but you are allowed to break it in a special case.

Exception

31
New cards

Involves taking advantage of the potential positive impacts of a risk. While this is less common in cyber security, it could involve leveraging a risky, technological innovation that could place the organization at a competitive advantage.

Risk Explotation

32
New cards

Involves understanding the process of communicating information about identified risks, their analysis, and mitigation strategies to relevant stakeholders. It ensures transparency and informs decision-making.

Risk Reporting

33
New cards

The process of identifying critical business functions and determining the impact on the organization if those functions are disrupted. Example: If a bank’s payment system goes down for 1 hour → lost transactions and revenue

Business impact analysis

34
New cards

The maximum acceptable time a system can be down before it must be restored. (Downtime) Simple meaning: How fast do we need to be back online?

Recovery Time Objective (RTO)

35
New cards

The maximum acceptable amount of data loss measured in time.(Dataloss) Simple meaning: How much data can we lose?

Recovery Point Objective (RPO)

36
New cards

The average time it takes to fix and restore a failed system. Simple meaning: How long does it take to fix something?

Mean Time to Repair (MTTR)

37
New cards

The average time a system runs before it fails again.Simple meaning: How reliable is the system?

Mean Time Between Failures (MTBF)