Section 3 Risk Management

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/37

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

What is the main responsibility of a cyber security professional

To manage risk

2
New cards

Risks can be divided as

Internal or External

3
New cards

Internal Risk

Risks that arise from inside the organization

4
New cards

External Risk

Risks that arise outside the organization

5
New cards

Multiparty Risks

Risks that affect more than one organization

6
New cards

Intellectual Property theft poses a risk to what kind of organizations?

Knowledge-based

7
New cards

Legacy Systems should

be replaced with modern solutions or have strong controls around them

8
New cards

Software license compliance issues risk what?

Risk fines and legal action

9
New cards

Risk Assessment

the process of identifying and triaging the risks facing an organization based on likelihood of occurrence and extended impact on the organization

10
New cards

Threats

External forces that jeopardize security

11
New cards

Threat Vector

Methods used by an attacker to get to your target

12
New cards

Vulnerabilities

Weaknesses in your security controls

13
New cards

Risks

Are the combination of a threat and a vulnerability

14
New cards

What are the two factors in which risks are ranked

By their likelihood and impact

15
New cards

Qualitative Risk Assessment

Uses subjective ratings to evaluate risk, likelihood, and impact

16
New cards

Quantitative Risk Assessment

Uses objective numeric ratings to evaluate risk likelihood and impact

17
New cards

Risk Treatment

Analyzes and implements possible responses to control risk

18
New cards

The 4 basic risk treatment options

  1. Risk Avoidance

  2. Risk Transference

  3. Risk Mitigation

  4. Risk Acceptance

19
New cards

Risk Avoidance

changing the business practices to make a risk irrelevant

20
New cards

Risk Transference

shifts the impact of a risk from one org to another (Insurance)

21
New cards

Risk Mitigation

actions that reduce likelihood and impact of a risk

22
New cards

Risk Acceptance

is the choice to continue operations in the face of risk

23
New cards

Risk Profile

The combination of risks that affect an organization

24
New cards

Risk Tolerance

the level of risk an org is willing to accept

25
New cards

Security Controls

Reduce the likelihood and impact of a risk and helps identify issues

26
New cards

Defense in Depth

Uses overlapping security controls to achieve the same objective

27
New cards

Can group controls based on what two things

Their purpose or control mechanism

28
New cards

Preventative Controls

Stops a security issue from occurring (purpose)

29
New cards

Detective Controls

Identifies security issues requiring investigation (purpose)

30
New cards

Recovery Controls

Remediate security issues that have occurred (purpose)

31
New cards

Technical controls

uses technology to achieve control objectives

32
New cards

What is another term for Technical Controls?

Logical Controls

33
New cards

Administrative Controls

uses processes to achieve control objectives

34
New cards

Physical Controls

impacts the physical world

35
New cards

Configuration Management

Tracks specific device settings

36
New cards

Baselines

provide a configuration snapshot

37
New cards

Versioning

Assigns numbers to each version

38
New cards

Diagrams

Serve as important configuration artifacts