Week 4: Risk Treatment

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:48 PM on 5/16/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

60 Terms

1
New cards

Risk Treatment

The process of addressing a risk after it has been identified, assessed, and evaluated.

2
New cards

Residual Risk

The remaining risk that has not been completely removed when vulnerabilities have been controlled to the degree possible.

3
New cards

Risk Appetite

The quantity and nature of risk that organizations are willing to accept.

4
New cards

Goal of Cybersecurity

To bring residual risk in line with the organization's risk appetite.

5
New cards

Risk Treatment Strategy Options

Mitigation, Transference, Acceptance, Termination.

6
New cards

Risk Mitigation

Eliminate or reduce risk through the application of additional controls and safeguards.

7
New cards

Types of Mitigation Plans

Incident response (IR) plan, Disaster recovery (DR) plan, Business continuity (BC) plan, Crisis management (CM) plan.

8
New cards

Risk Transference

Shift risk to other assets, processes, or organizations.

9
New cards

Examples of Risk Transference

Outsourcing the security function, Purchasing cybersecurity insurance, Revising deployment models.

10
New cards

Risk Acceptance

Organization decides to do nothing more and accepts the current level of residual risk.

11
New cards

Termination Strategy

The organization chooses not to use a digital asset, removing the need to protect it.

12
New cards

Cost-Benefit Analysis (CBA)

An economic feasibility study done to determine whether the value of an asset warrants its protection.

13
New cards

Cost Avoidance

Spend money on a defense strategy via the implementation of a control to eliminate the financial ramifications of an incident.

14
New cards

The RM Process

Guided by the RM framework, it includes Risk Assessment & Risk Treatment as essential processes.

15
New cards

Role of Process Communication

Continuous feedback from the process team to the framework team about the success and challenges of its RM activities.

16
New cards

Monitoring in RM Process

Ongoing collection of information about issues arising at each stage of the RM process.

17
New cards

Review in RM Process

Establishing formal performance measures and analyzing performance metric data to assess the relative success of the RM program.

18
New cards

Managing Risk Goal

Balancing the expense against the possible losses if vulnerabilities are exploited successfully.

19
New cards

Application of Technology in Risk Mitigation

To reduce risk by deploying preventative controls, detective controls, and response controls.

20
New cards

Outsourcing

Hiring individuals or firms to provide expertise in areas where an organization lacks adequate security management.

21
New cards

Effective Service Level Agreement (SLA)

A key requirement for risk transference strategy.

22
New cards

Cost of development or acquisition

An item that affects the cost of a control or safeguard.

23
New cards

Training fees

An item that affects the cost of a control or safeguard.

24
New cards

Cost of implementation

An item that affects the cost of a control or safeguard.

25
New cards

Service costs

An item that affects the cost of a control or safeguard.

26
New cards

Cost of maintenance

An item that affects the cost of a control or safeguard.

27
New cards

Potential cost from the loss of the asset

An item that affects the cost of a control or safeguard.

28
New cards

Benefit

The value gained by using controls to prevent losses associated with a specific vulnerability.

29
New cards

Asset valuation

Assigning financial value to each information asset.

30
New cards

Components of asset valuation

Includes value to owners, value of intellectual property, value to adversaries, loss of productivity, loss of revenue, and total cost of ownership.

31
New cards

SLE (Single Loss Expectancy)

The calculated value associated with the most likely loss from a single occurrence of a specific attack.

32
New cards

SLE formula

SLE = asset value (AV) × exposure factor (EF).

33
New cards

ARO (Annualised Rate of Occurrence)

Expected frequency of a specific type of attack to occur per year.

34
New cards

ALE (Annualised Loss Expectancy)

Overall loss potential per risk, calculated using ARO and SLE.

35
New cards

CBA purpose

To determine whether the benefit of a control justifies its cost.

36
New cards

CBA formula

CBA = ALE (precontrol) − ALE (postcontrol) − ACS.

37
New cards

Benchmarking

Comparing organizational security effectiveness, efficiency, and productivity against an established measure.

38
New cards

Exercise due care

Adopts a certain minimum level of security.

39
New cards

Qualitative assessment

Risk assessment steps using qualitative estimates.

40
New cards

Hybrid asset valuation

A more granular approach that creates a value for an asset reducing ambiguity of qualitative measures.

41
New cards

Delphi Technique

A process whereby a group of experts rates or ranks a set of information through iterative feedback.

42
New cards

Organizational feasibility

Examines how well the proposed cybersecurity alternatives will contribute to efficiency, effectiveness, and overall operation of an organization.

43
New cards

Operational feasibility

User acceptance and support, management acceptance and support, and the system's compatibility with the requirements of the organization's stakeholders.

44
New cards

Behavioral feasibility

Also known as organizational feasibility.

45
New cards

Technical feasibility

Determines whether required technology and expertise exist or can be acquired.

46
New cards

Political feasibility

Defines what can and cannot occur based on the consensus and relationships between the communities of interest.

47
New cards

Risk Treatment Practices

Includes valuing information assets and handling changes, with standards and best industry practices as better alternatives.

48
New cards

OCTAVE method

Operationally Critical Threat, Asset, and Vulnerability Evaluation; a risk evaluation methodology for balancing protection of critical information assets vs. the costs of providing protective and detection controls.

<p>Operationally Critical Threat, Asset, and Vulnerability Evaluation; a risk evaluation methodology for balancing protection of critical information assets vs. the costs of providing protective and detection controls.</p>
49
New cards

FAIR (Factor Analysis of Information Risk)

Supports understanding, analyzing, and measuring information risk.

<p>Supports understanding, analyzing, and measuring information risk.</p>
50
New cards

FAIR outcomes

More cost-effective risk management, greater professional credibility, and a basis for a scientific, repeatable risk management approach.

51
New cards

FAIR framework components

Includes a taxonomy for information risk, standard nomenclature for information risk terms, a framework for establishing data collection criteria, measurement scales for risk factors, a computational engine for calculating risk, and a modeling construct for analyzing complex risk scenarios.

52
New cards

ISO 27000 series

Includes a standard for the performance of Risk Management, ISO 27005.

53
New cards

ISO 27005 methodology stages

Risk Assessment, Risk Treatment, Risk Acceptance, Risk Communication, Risk Monitoring and Review.

<p>Risk Assessment, Risk Treatment, Risk Acceptance, Risk Communication, Risk Monitoring and Review.</p>
54
New cards

ISO 31000

Risk management principles, framework, and process.

55
New cards

NIST Risk Management Approach

An organization-wide risk management approach.

56
New cards

NIST Risk Management Framework

A structured approach to risk management.

57
New cards

Selecting the Best Risk Management Model

Involves studying established RM models and identifying what each offers to the envisioned process.

58
New cards

Engaging with security professionals

Important when building a risk management program from scratch.

59
New cards

Professional security organization meetings

Like ISS, can be useful for networking and knowledge sharing.

60
New cards

Still learning (4)

You've begun learning these terms. Keep up the good work!