Analyzing Risk + Risk Identification

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

Threats

are any possible events that might have an adverse impact on the confidentiality, integrity, and/or availability of our information or information systems

2
New cards

Vulnerabilities

are weaknesses in our systems or controls that could be exploited by a threat

3
New cards

Risks

occur at the intersection of a vulnerability and a threat that might exploit that vulnerability. A threat without a corresponding vulnerability does not pose a ___, nor does a vulnerability without a corresponding threat

4
New cards

External risks

are those risks that originate from a source outside the organization

5
New cards

Internal risks

are those risks that originate from within the organization

6
New cards

Multiparty risks

are those that impact more than one organization

7
New cards

Legacy

systems

8
New cards

IP theft risks

occur when a company possesses trade secrets or other proprietary information that, if disclosed, could comprise the organization’s business advantage

9
New cards

Software compliance/licensing risks

occur when an organization licenses software from a vendor and intentionally or accidentally runs afoul of usage limitations that expose the customer to financial and legal risk