IT RISK 1

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

What is the definition of IT Risk?

The potential exposure or loss or harm stemming from an organization's Information Technology (IT), Operational Technology (OT), or other computer-based technology.

2
New cards

What is the difference between Cybersecurity and IT Risk?

Cybersecurity focuses on protecting IT systems from threats, while IT Risk encompasses the potential losses or harm from those threats.

3
New cards

What is the relationship between IT Risk and Enterprise Risk Management?

IT Risk is one of the categories of Enterprise Risks.

4
New cards

What types of risks are included in Enterprise Risk Management?

Credit Risks, Market Risks, Financial Risks, Strategic Risks, Operational Risks, Compliance Risks.

5
New cards

What is the focus of the IT Risk Management Framework?

To manage and mitigate risks associated with information technology.

6
New cards

What is the importance of understanding IT Risk in an organization?

To identify and mitigate potential losses or harm from technology-related threats.

7
New cards

What is the relationship between digital transformation and cybersecurity?

Digital transformation makes cybersecurity a business issue, not just an IT issue.

8
New cards

What does it mean to protect the 'crown jewels' in cybersecurity?

It refers to the practice of identifying and safeguarding the most valuable data within an organization.

9
New cards

What is a risk-based approach in cybersecurity?

It emphasizes that cybersecurity is not just about spending money, but about strategically managing risks.

10
New cards

What are the main functions of IT risk management?

Govern, comply, manage risk, protect, shield, respond, recover, sustain, defend, prevent, monitor, hunt, detect, and educate.

11
New cards

What does the CIA triad in cybersecurity stand for?

Confidentiality, Integrity, and Availability.

12
New cards

What is confidentiality in the context of the CIA triad?

Ensuring that information is accessible only to those authorized to have access.

13
New cards

What does integrity mean in cybersecurity?

Safeguarding the accuracy and completeness of information and processing methods.

14
New cards

What is meant by availability in the CIA triad?

Ensuring that authorized users have access to information and associated assets when required.

15
New cards

What is cyberspace?

A concept describing a widespread, interconnected digital technology.

16
New cards

What are the three dimensions of cyberspace?

Physical, Informational, and Cognitive.

17
New cards

What does the physical dimension of cyberspace encompass?

The core technical infrastructure of networked hardware and software.

18
New cards

What is included in the informational dimension of cyberspace?

Content or data at rest or in transit.

19
New cards

What does the cognitive dimension of cyberspace refer to?

Knowledge, values, beliefs, concepts, intentions, and perceptions of individuals and groups.

20
New cards

What are some potential costs of IT risk for businesses?

Data theft, financial loss, identity theft, reputational damage, asset damage, legal penalties, and impact on critical infrastructure.

21
New cards

What is the significance of the SAR threshold in the US?

It is set at $10,000, which triggers a Suspicious Activity Report.

22
New cards

How much was the average income for the top 10% in 2020?

$173,000.

23
New cards

How does $1 million in cash compare in physical space?

It doesn't fill a briefcase when in $100 bills.

24
New cards

How much physical space does $1 billion in cash occupy?

It takes about 10 crates of $100 bills.

25
New cards

What is the impact of failing to mitigate IT threats?

It can lead to various forms of theft, damage, and legal consequences.

26
New cards

Why is addressing cyber risk considered challenging for organizations?

Organizations have made little progress in effectively addressing cyber risk.

27
New cards

What role does artificial intelligence play in cybersecurity?

AI can be used in attacks that learn and adapt over time.

28
New cards

What is a key challenge in balancing business growth and cybersecurity?

Finding the right balance between profitability and adequate cybersecurity measures.

29
New cards

What is the SAR threshold in the US?

$10,000

30
New cards

What was the average income for the top 10% in 2020?

$173,000

31
New cards

How much money does $1 million in $100 bills fill?

It does not fill a briefcase.

32
New cards

How many crates of $100 bills are equivalent to $1 billion?

10 crates

33
New cards

What was the top hedge fund's AUM in 2022?

$126 billion

34
New cards

What was Apple Computer's valuation in 2018?

$1 trillion

35
New cards

What were Apple's valuations in 2020 and 2023?

$2 trillion in 2020 and $3 trillion in 2023.

36
New cards

Who is responsible for managing IT risk within an organization?

Everyone, including IT, HR, Finance, Legal, individual businesses, and staff.

37
New cards

What is the role of the Chief Information Security Officer (CISO)?

Responsible for the management and execution of Cybersecurity policy and programs.

38
New cards

What is the Board of Directors' involvement in Cybersecurity Risk Management?

They commit to managing information risk, understand cyber risks, respond to incidents, evaluate risk reports, and support budget requirements.

39
New cards

What is a key focus for pre-breach CISOs?

They tend to focus more on tools.

40
New cards

What do post-breach CISOs realize is more important than tools?

People and processes.

41
New cards

What is the purpose of the DIKW Pyramid?

It is a framework for understanding the relationship between Data, Information, Knowledge, and Wisdom.

42
New cards

What is the assignment due prior to Session 2 about?

Conducting research on a publicly available cybersecurity breach, summarizing what happened, root causes, and the impact including costs.

43
New cards

What chapters are included in the readings for Principles of Computer Security?

Chapter 1 (pages 1-17), Chapter 2 (pages 26-29), Chapter 4 (pages 86-106), Chapter 15 (pages 574-609).

44
New cards

What additional readings are posted in Module 2?

Credential Stuffing (NYAG), Tampering with QR Codes to Steal Victim Funds, DBIR Report.