Section 21: Risk Assessments

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 34

flashcard set

Earn XP

Description and Tags

35 Terms

1
Risk Assessments
A process used inside of risk management to identify how much risk exists in a given network or system
New cards
2
Risk
The probability that a threat will be realized
New cards
3
Vulnerabilities
Weaknesses in the design or implementation of a system
New cards
4
Threat
Any condition that could cause harm, loss, damage, or compromise to our information technology. These are external and beyond your control.
New cards
5
Risk Avoidance
A strategy that requires stopping the activity that has risk or choosing a less risky alternative
New cards
6
Risk Transfer
A strategy that passes the risk to a third party
New cards
7
Risk Mitigation
A strategy that seeks to minimize the risk to an acceptable level
New cards
8
Risk Acceptance
A strategy that seeks to accept the current level of risk and the costs associated with it if the risk were realized
New cards
9
Residual Risk
The risk remaining after trying to avoid, transfer, or mitigate the risk
New cards
10
Qualitative Risk
Using intuition, experience, and other methods to assign a relative value to risk
New cards
11
Quantitative Risk
Using numerical and monetary values to calculate risk
New cards
12
Magnitude of Impact
An estimation of the amount of damage that a negative risk might achieve
New cards
13
Single Loss Expectancy (SLE)
Cost associated with the realization of each individualized threat that occurs. SLE \= Asset Value * Exposure Factor
New cards
14
Annualized Rate of Occurrence (ALO)
Number of time per year that a threat is realized
New cards
15
Annualized Loss Expectancy (ALE)
Expected cost of a realized threat over a given year. ALE \= SLE * ARO
New cards
16
Security Assessments
Verify that the organization's security posture is designed and configured properly to help thwart different types of attacks. These might be required by contracts, regulations, or laws
New cards
17
Active Assessments
Utilize more intrusive techniques like scanning, hands-on testing, and probing of the network to determine vulnerabilities
New cards
18
Passive Assessments
Utilize open source information, the passive collection and analysis of network data, and other unobtrusive methods without making direct contact with the targeted systems. These are limited in the amount of details they can find.
New cards
19
Security Controls
Methods implemented to mitigate a particular risk
New cards
20
Physical Controls
Any security measures that are designed to deter or prevent unauthorized access to sensitive information or the systems that contain it
New cards
21
Technical Controls
Safeguards and countermeasures used to avoid, detect, counteract, or minimize security risks to our systems and information
New cards
22
Administrative Controls
Focused on changing the behavior of people instead of removing the actual risk involved
New cards
23
Management Controls
Security Controls that are focused on the decision-making and the management of risk
New cards
24
Operational Controls
Focused on things done by people
New cards
25
Technical Controls
Logical controls that are put into a system to help secure it
New cards
26
Preventative Controls
Security Controls that are installed before an event happens and are designed to prevent something from occurring
New cards
27
Detective Controls
Used during the event to find out whether something bad might be happening
New cards
28
Corrective Controls
Used after an event occurs
New cards
29
Compensating Control
used whenever you can't meet the requirements for a normal control.
New cards
30
External Risk
Risks that are produced by a non-human source and are beyond human control
New cards
31
Internal Risk
Risks that are formed within the organization, arise during normal operations, and are often forecastable
New cards
32
Legacy Systems
An old method, technology, computer system, or application program which includes an outdated computer system still in use
New cards
33
Multiparty
A risk that refers to the connection of multiple systems or organizations with each bringing their own inherent risks
New cards
34
Intellectual property (IP) Theft
Risk associated with business assets and property being stolen from an organization in which economic damage, the loss of a competitive edge, or a slowdown in business growth occurs
New cards
35
Software Compliance/Licensing
Risk Associated with a company not being aware of what software or components are installed within its network
New cards

Explore top notes

note Note
studied byStudied by 10 people
752 days ago
5.0(1)
note Note
studied byStudied by 8 people
909 days ago
5.0(1)
note Note
studied byStudied by 56 people
899 days ago
5.0(1)
note Note
studied byStudied by 30 people
974 days ago
4.0(1)
note Note
studied byStudied by 1114 people
680 days ago
4.0(6)
note Note
studied byStudied by 58 people
1065 days ago
5.0(1)
note Note
studied byStudied by 6 people
760 days ago
5.0(1)
note Note
studied byStudied by 139196 people
332 days ago
4.8(594)

Explore top flashcards

flashcards Flashcard (49)
studied byStudied by 111 people
543 days ago
4.8(4)
flashcards Flashcard (138)
studied byStudied by 201 people
870 days ago
5.0(4)
flashcards Flashcard (40)
studied byStudied by 21 people
554 days ago
5.0(2)
flashcards Flashcard (60)
studied byStudied by 7 people
15 days ago
5.0(1)
flashcards Flashcard (63)
studied byStudied by 3 people
739 days ago
5.0(1)
flashcards Flashcard (36)
studied byStudied by 30 people
550 days ago
5.0(4)
flashcards Flashcard (28)
studied byStudied by 2 people
729 days ago
5.0(1)
flashcards Flashcard (46)
studied byStudied by 232 people
69 days ago
5.0(1)
robot