BEM 393 Test 2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:58 PM on 4/8/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

36 Terms

1
New cards

COSO ERM Principles

Governance and Culture

Strategy and Objective Setting

Review and Revision

Info, Communication, Reporting

2
New cards

ISO 310000

First global standard risk management standard that aligns with coso

Principles (Value Creattion and Protection) > Process (Comms + Consultation) and (Monitoring + Review)

3
New cards

Residual Risk

Should be </= risk appetite

4
New cards

Business Process

Set of coordinated activities linked with each other for purposes of achieving an objective.

5
New cards

COSO

widely recognized framework for managing risk

6
New cards

Project

Relatively unique activity, long period of time, complex sequencing, not done continuously

7
New cards

Operating Process

continuous, core process through which a business achieves its objectives - ie in manufacturing the process through which a company creates and sells products

8
New cards

Management and Support Activities

processes that oversee and support core value creation process

ex: hr, payroll, legal, accounting, etc

9
New cards

Key Links

processes that have a direct role in managing risk

10
New cards

secondary risk

processes that manage risk indirectly

11
New cards

Business Process Outsourcing

ex: payroll, customer care, IT

1) mgt still accountable for the risk
2) need to ensure adequate system of internal controls exists
3) Ensure means for monitoring effectiveness of controls
4) Obtain assurances reports from vendor

12
New cards

Value at Risk (VaR)

measures potential loss of mkt value for a position for a given confidence level and holding period. works best for liquid trading securities over short holding periods.

  • Under estimates extreme losses and performs poorly in stressed markets

13
New cards

Expected Shortfall Model

Represents the expected losses in a portfolio for risk beyond the VaR confidence level. Takes into consideration extreme markt conditions

14
New cards

Asset/Liability Management

measures the risk that faces banks due to duration mismatch between assets and liabilities (Market Risk)

ex: 1980s S&L crisis

15
New cards

Credit Risk

the economic loss suffered due to default of a borrower or counterparty.

Asymmetrical risk

16
New cards

Basel III

regulatory framework on bank capital adequacy, stress testing, and market liquidity risk.

  1. More equity

  2. Supervisory monitorings

  3. prescribed public discourse + mkt discipline

17
New cards

RAROC

Risk Adjusted Returns on Capital

RAROC < KE = destry value

RAROC > KE adds value

18
New cards

Economic Capital

the amount of capital required fund ongoing operations and growth and to absorb unexpected loss.

FORWARD LOOKING INDICATOR OF FUTURE PERFORMANCE

19
New cards

Edge Devices

hardware components located at the boundary of a network—close to data sources or users—that process, analyze, and transmit data locally rather than relying solely on a centralized cloud or data center. They reduce latency, minimize bandwidth usage, and enable real-time, decentralized decision-making in IoT, AI, and industrial applications.

20
New cards

Man in the Middle

Hacker is placed in between a client (user) and a host (server) to read, modify, or steal data.

21
New cards

Trust Services Framework

The assumption that internal users are inherently trustworthy, known as implicit trust, has resulted in many costly data breaches,

22
New cards

Zero Trust

cybersecurity approach that denies access to an enterprise's digital resources by default and grants authenticated users and devices tailored, siloed access to only the applications, data, services and systems they need to do their jobs

23
New cards

Insider Threat

a cybersecurity risk that comes from within the organization — usually by a current or former employee or other person who has direct access to the company network, sensitive data and intellectual property (IP), as well as knowledge of business processes, company policies or other information that would help carry out such an attack

24
New cards

Explicit Verification

Identities need to be verified, and access requests need to be authenticated and authorized appropriately

25
New cards

Assumption of breach

Setting up architecture in a way that minimizes damage in the event of a breach is critical. Otherwise, security professionals can do little to thwart lateral and internal attacks.

26
New cards

Principles of Zero Trust

Explicit Verification

Assumption of Breach

The Principle of Least Privilege

27
New cards

Principle of Least Privilege

demands that users and devices are only granted the minimum level of access necessary to perform their business tasks.

28
New cards

Software supply chain

Confirming it went through pipleine and ensuring it went through security scans

29
New cards

Code provenance

the verifiable history of software, detailing its origin, creators, and modifications from source to deployment

30
New cards

Microsegmentation

network security architecture that establishes security zone boundaries at the level of individual workloads within data centers and cloud environments, which allows workloads to be isolated and secured

31
New cards

P > D + C

 P is time it takes an attacker to break through preventive controls

 D is time it takes to detect an attack is in progress

 C is time it takes to respond to the attack and take corrective action

32
New cards
33
New cards
34
New cards
35
New cards
36
New cards