Chapter 4: Risk Management: Treating Risk

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/54

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

Risk treatment (risk response/risk control)

The process of addressing unacceptable levels of risk (those exceeding the organization’s risk appetite) through strategies such as mitigation, transference, acceptance, or termination.

2
New cards

Four basic risk treatment strategies

The main approaches for handling risk: mitigation (reduce), transference (shift), acceptance (tolerate), and termination (eliminate).

3
New cards

Risk mitigation (defense strategy)

Applying policies, training, and technical safeguards to eliminate or reduce risk by lowering the likelihood or impact of attacks.

4
New cards

Risk transference

Shifting risk to other entities (e.g., insurers, contractors, managed security providers) through outsourcing or formal agreements.

5
New cards

Risk acceptance

Choosing to live with residual risk when mitigation or controls are not cost-justified, based on a formal, informed business decision.

6
New cards

Risk termination (avoidance)

Removing an information asset from service to eliminate all associated risk; a deliberate decision rather than neglect.

7
New cards

Residual risk

The remaining risk after controls are implemented; cannot be fully eliminated if the asset remains active.

8
New cards

Process communications

Ongoing feedback between the governance group, RM framework team, and RM process team to ensure coordination and continuous improvement.

9
New cards

Process monitoring and review

Measuring performance, collecting data, and reviewing feedback to refine the RM process and ensure controls are effective.

10
New cards

Contingency planning (CP) mitigation

The planning and preparation to reduce damage from incidents or disasters when preventive controls fail (IR, DR, BC, CM plans).

11
New cards

Incident response (IR) plan

Defines immediate actions during an incident (e.g., data breach), focusing on detection, containment, and recovery.

12
New cards

Disaster recovery (DR) plan

Outlines short-term recovery procedures to restore IT systems and data after a disaster.

13
New cards

Business continuity (BC) plan

Ensures long-term continuation of critical business functions if a major disruption exceeds DR capabilities.

14
New cards

Crisis management (CM) plan

Protects personnel and manages communications and safety during incidents or disasters.

15
New cards

Risk appetite

The level and type of risk an organization is willing to accept while pursuing its objectives.

16
New cards

Residual risk vs risk appetite

The goal is to reduce residual risk to align with the organization’s documented risk appetite—not to eliminate risk entirely.

17
New cards

Cost–benefit analysis (CBA)

Formal comparison of control costs against potential benefits or loss reductions to determine if a safeguard is justified.

18
New cards

Single loss expectancy (SLE)

Expected monetary loss from one occurrence: SLE = Asset Value × Exposure Factor.

19
New cards

Annualized rate of occurrence (ARO)

Likelihood or frequency of a specific threat event occurring per year.

20
New cards

Annualized loss expectancy (ALE)

Expected yearly loss from a specific threat: ALE = SLE × ARO.

21
New cards

Economic feasibility

Evaluates whether implementing a security control is financially justified based on expected benefits.

22
New cards

Qualitative valuation

Uses descriptive labels (e.g., high, medium, low) instead of numeric values to estimate likelihood or impact.

23
New cards

Hybrid valuation

Combines qualitative scales with numeric ranges for a more precise yet flexible approach.

24
New cards

Delphi technique

A collaborative, iterative process where experts anonymously rate or rank risks until consensus is reached.

25
New cards

Organizational feasibility

Measures whether a control aligns with the organization’s strategic goals and direction.

26
New cards

Operational feasibility

Measures how well a control fits organizational culture and user acceptance; relies on communication, education, and involvement.

27
New cards

Technical feasibility

Evaluates if the organization has the necessary infrastructure, software, and skills to implement a proposed control.

28
New cards

Political feasibility

Assesses whether proposed solutions fit within the organization’s political and resource environment.

29
New cards

Benchmarking

Comparing processes or performance against internal baselines or external best practices to identify improvements.

30
New cards

Due care

Meeting the minimum reasonable level of security expected for similar organizations under similar circumstances.

31
New cards

Due diligence

The ongoing maintenance and monitoring of controls to ensure due care standards remain met.

32
New cards

Best business practices

Industry-recognized methods that balance usability and protection effectively.

33
New cards

Gold standard

The highest level of cybersecurity excellence; setting the benchmark for an industry.

34
New cards

Government recommendations and standards

Authoritative frameworks (e.g., NIST, ISO) that guide organizations on best cybersecurity and RM practices.

35
New cards

OCTAVE methodology

Carnegie Mellon’s risk evaluation approach balancing asset protection with cost; includes OCTAVE, OCTAVE-S, and OCTAVE-Allegro versions.

36
New cards

FAIR framework

Factor Analysis of Information Risk—a quantitative model for assessing information risk using defined steps and terminology.

37
New cards

ISO 27005

Standard focusing on the information security risk management process.

38
New cards

ISO 31000

General RM standard providing risk management principles, frameworks, and processes applicable to all risk types.

39
New cards

NIST RMF

Seven-step framework integrating RM into system lifecycles: Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor.

40
New cards

NIST RMF tiers

Three organizational levels: governance (strategic), business processes (tactical), and information systems (operational).

41
New cards

MITRE RM model

Four-step process: identify risk, assess impact, prioritize, and plan/monitor mitigation.

42
New cards

ENISA RM model

EU agency model emphasizing identification, assessment, treatment, and monitoring; provides online RM tool comparisons.

43
New cards

IsecT methodology

New Zealand consultancy offering ISO 27001-aligned RM resources and methods via iso27001security.com.

44
New cards

Selecting an RM model

Organizations should review available models, identify best-fit practices, and adapt them rather than striving for perfection.

45
New cards

“Perfect is the enemy of the good”

Encourages implementing good, timely security rather than delaying for unattainable perfection.

46
New cards

Consultant use in RM

Organizations may hire experts to develop or customize proprietary RM models suited to their needs.

47
New cards

Risk treatment practices

Controls often affect multiple threat–vulnerability–asset combinations; decisions should consider shared benefits and overall ALE changes.

48
New cards

Feasibility types in RM

Four main types: organizational, operational, technical, and political feasibility—all impact the success of risk treatment strategies.

49
New cards

Total cost of ownership (TCO)

The total direct and indirect costs over an asset’s lifecycle—development, operation, protection, and disposal.

50
New cards

Economic cost avoidance

The savings realized from preventing incidents through proactive control implementation.

51
New cards

Risk treatment cycle

The continuous process of assessing, treating, monitoring, and improving controls and strategies.

52
New cards

Residual risk reestimation

The process of calculating new residual risk after applying controls and comparing it against risk appetite.

53
New cards

Risk management models

Examples include OCTAVE, FAIR, ISO 27005/31000, and NIST RMF—each provides structured approaches to managing cyber risk.

54
New cards

“Good security now is better than perfect security never”

The practical principle emphasizing timely implementation of reasonable protection over indefinite pursuit of perfection.

55
New cards