Chapter 3: Risk Management: Assessing Risk key terms

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Enterprise Risk Management (ERM)

The evaluation and reaction to risk for the entire organization, not just the risk facing information assets.

2
New cards

Cybersecurity Risk Management

The application of safeguards or controls to reduce the risks to an organization’s information assets to an acceptable level.

3
New cards

Risk Management

The process of discovering and assessing the risks to an organization’s operations and determining how those risks can be controlled or mitigated.

4
New cards

Risk Treatment

The reduction of risk, including cybersecurity risk, to an acceptable level. See also risk control.

5
New cards

Risk Control

The reduction of risk, including cybersecurity risk, to an acceptable level. See also risk treatment.

6
New cards

RM Framework

The overall structure of the strategic planning and design for the entirety of the organization’s RM efforts.

7
New cards

RM Process

The identification, analysis, evaluation, and treatment of risk to information assets, as specified in the RM framework.

8
New cards

Risk Management Policy

The managerial directive designed to regulate organizational efforts related to the identification, assessment, and treatment of risk to information assets.

9
New cards

Residual Risk

The risk to information assets that remains even after current controls have been applied.

10
New cards

Risk Appetite

The quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect cybersecurity and unlimited accessibility.

11
New cards

Risk Tolerance

The assessment of the amount of risk an organization is willing to accept for a particular information asset or set of assets, typically synthesized into the organization’s overall risk appetite. See also risk threshold.

12
New cards

Risk Threshold

The assessment of the amount of risk an organization is willing to accept for a particular information asset or set of assets. See also risk tolerance.

13
New cards

Risk Appetite Statement

A formal document developed by the organization that specifies its overall willingness to accept risk to its information assets, based on a synthesis of individual risk tolerances.

14
New cards

Zero Tolerance Risk Exposure

An extreme level of risk acceptance whereby the organization is unwilling to allow any successful attacks or suffer any loss to an information asset.

15
New cards

Risk Management Plan

A document that contains specifications for the implementation and conduct of RM efforts.

16
New cards

Risk Identification

The recognition, enumeration, and documentation of risks to an organization’s information assets.

17
New cards

Information Media

System elements such as hardware, operating systems, applications, and utilities that collect, store, process, and transmit information. See also system components.

18
New cards

System Components

System elements such as hardware, operating systems, applications, and utilities that collect, store, process, and transmit information. See also information media.

19
New cards

Data Classification Scheme

The assignment of levels of confidentiality to information assets as part of an access control methodology; the scheme is designed to restrict the number of people who can access it.

20
New cards

Threat Assessment

An evaluation of the threats to information assets, including a determination of their likelihood of occurrence and potential impact of an attack.

21
New cards

Cyber Hygiene

The individual decisions made and practices used when interacting with computing technology.

22
New cards

Risk Analysis

A determination of the extent to which an organization’s information assets are exposed to risk.

23
New cards

Likelihood

The probability of the successful exploitation of a specific asset’s vulnerability by a threat.

24
New cards

Impact

The potential outcome of the successful exploitation of a specific asset’s vulnerability by a threat. See also consequence.

25
New cards

Consequence

The potential outcome of the successful exploitation of a specific asset’s vulnerability by a threat. See also impact.

26
New cards

Risk Aggregation

The merging or combining of groups of assets, threats, and their associated risks into more general categories to simplify risk assessment.

27
New cards

Uncertainty

The state of having limited or imperfect knowledge of a situation, making it less likely that organizations can successfully anticipate future events or outcomes.

28
New cards

Risk Determination

The calculation of risk associated with a Threats–Vulnerabilities–Assets (TVA) triplet using a formula based on the methodology employed.

29
New cards

Risk Rating Factor

The quantification of risk present in a Threats–Vulnerabilities–Assets (TVA) triplet, as derived in risk determination.

30
New cards

Risk Rating Worksheet

An extension of the TVA spreadsheet that only includes assets and relevant vulnerabilities along with the risk determination.

31
New cards

Risk Evaluation

The process of comparing an information asset’s risk rating to the numerical representation of the organization’s risk appetite or risk threshold to determine if risk treatment is required.

32
New cards

Process Communications

The necessary information flow within and among the governance group, RM framework team, and RM process team during the implementation of RM.

33
New cards

Process Monitoring and Review

The data collection and feedback associated with performance measures used during the conduct of a process.

34
New cards