Risk management

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

What is risk assessment

The process of identifying, prioritizing and deciding what to do about the risk to business asset.

2
New cards

Where can risk assessment be applied

Across the entire organization specific projects/departments

3
New cards

Name examples of high-values target in risk assessment

Servers, legacy system, intellectual property (IP) software licenses

4
New cards

risk assessment process

1: Risk awareness

2: gather cyber threat intelligence

3: Evaluate existing security controls

4: measure inherent and residual risk

5: Implement new controls

6: periodically review

5
New cards

What are environment risk

Natural floods and hurricanes

6
New cards

What are person-made risk

human threats like riots, terrorism , sabotage

7
New cards

What are internal risk

Insider threats or malware from within the organization

8
New cards

What are external risk?

External attacks like Distributed Denial of Service (DDos)

9
New cards

DDoS

attack is a type of cyberattack where multiple compromised computers flood a target, such as a website or server, with excessive traffic, making it slow or unavailable to legitimate users

10
New cards

What is risk mitigation

Proactively using control to reduce risk

11
New cards

What is risk transference

Shifting risk to a third part (cyber insurance )

12
New cards

What is risk avoidance

Choosing not to engage in risky activities

13
New cards

What is risk acceptance

Accepting a risk when it falls within the organization risk appetite

14
New cards

What is SLE

Expected monetary lose from a single incident SLE = AV EF ( example 24,000 assets * 25.5 Ef = 3000) ( Single loss expectancy)

15
New cards

What is ALE

Total expected loss per year ( ALE = SLE * ARO) ( Annualized Loss expectancy )

16
New cards

What is qualitative risk assessment?

Uses subject opinions to rate risk based on likelihood and impact

17
New cards

What is a risk register

A centralized log of all know risk , likehood, impact, owner and mitigation strategies

18
New cards

What is a risk heat map?

A visual (color-coded ) representation of risk severity and likeihood

19
New cards

What is a risk matrix

A table showing severity , likelihood of risk similar to a heat map but without color

20
New cards

Who are script kiddies?

Unskilled hackers using existing tools: external with low resources and sophistication

21
New cards

Who are hacktivists

Hackers with political/ social causes ; external and low in sophistication/funding

22
New cards

What is Shadow IT

Unauthorized IT use by employees (app/services) potentially creating vulnerabilties

23
New cards

What is an application allow list

A list of approved software/apps to reduce vulnerabilities

24
New cards

What are APTS

Nation-state backed, highly skilled, stealthy, prolonged attacks (advanced persistent threats)

25
New cards

What are nation state actors

(governemnt back groups using cyber esionage or strategic advantage

26
New cards

What is CVE

Common vulnerabilites and exposure: a public list of known threat

27
New cards

What is AIS

Real-time cybersecurity info exchange between organizations

28
New cards

What is TAXII

A system that shares cyber threat info like an RSS feeed

29
New cards

What is STIX

A data format for sharing structured threats information

30
New cards

What does CIS provide

Cybersecurity best practice

31
New cards

What does NIST RMF/CSF offer

Guidelines for managing cybersecurity risk

32
New cards

What do ISO.IEC 27001 and 27701 focus on

IT system and information security standards

33
New cards

What is SSAE SOC2 used for

Financial risk frameworks ensuring internal control

34
New cards

What is GDPR

EU regulation protecting personal data

35
New cards

What is HIPPAA

U.S law protecting patient health data

36
New cards

What is PCI DSS

Security standard for cardholder data (Visa/ Mastercard)

37
New cards

What is an AUP

Guidelines for proper use of company resources like email/web

38
New cards

What are account policies

Rules for security user account (e.g hardening access limits )

39
New cards

What is a data retention policy

Rules on how long data is kept (often by regulation)

40
New cards
41
New cards
42
New cards
43
New cards
44
New cards