A process used inside of risk management to identify how much risk exists in a given network or system
2
New cards
Risk
The probability that a threat will be realized
3
New cards
Vulnerabilities
Weaknesses in the design or implementation of a system
4
New cards
Threat
Any condition that could cause harm, loss, damage, or compromise to our information technology. These are external and beyond your control.
5
New cards
Risk Avoidance
A strategy that requires stopping the activity that has risk or choosing a less risky alternative
6
New cards
Risk Transfer
A strategy that passes the risk to a third party
7
New cards
Risk Mitigation
A strategy that seeks to minimize the risk to an acceptable level
8
New cards
Risk Acceptance
A strategy that seeks to accept the current level of risk and the costs associated with it if the risk were realized
9
New cards
Residual Risk
The risk remaining after trying to avoid, transfer, or mitigate the risk
10
New cards
Qualitative Risk
Using intuition, experience, and other methods to assign a relative value to risk
11
New cards
Quantitative Risk
Using numerical and monetary values to calculate risk
12
New cards
Magnitude of Impact
An estimation of the amount of damage that a negative risk might achieve
13
New cards
Single Loss Expectancy (SLE)
Cost associated with the realization of each individualized threat that occurs. SLE \= Asset Value * Exposure Factor
14
New cards
Annualized Rate of Occurrence (ALO)
Number of time per year that a threat is realized
15
New cards
Annualized Loss Expectancy (ALE)
Expected cost of a realized threat over a given year. ALE \= SLE * ARO
16
New cards
Security Assessments
Verify that the organization's security posture is designed and configured properly to help thwart different types of attacks. These might be required by contracts, regulations, or laws
17
New cards
Active Assessments
Utilize more intrusive techniques like scanning, hands-on testing, and probing of the network to determine vulnerabilities
18
New cards
Passive Assessments
Utilize open source information, the passive collection and analysis of network data, and other unobtrusive methods without making direct contact with the targeted systems. These are limited in the amount of details they can find.
19
New cards
Security Controls
Methods implemented to mitigate a particular risk
20
New cards
Physical Controls
Any security measures that are designed to deter or prevent unauthorized access to sensitive information or the systems that contain it
21
New cards
Technical Controls
Safeguards and countermeasures used to avoid, detect, counteract, or minimize security risks to our systems and information
22
New cards
Administrative Controls
Focused on changing the behavior of people instead of removing the actual risk involved
23
New cards
Management Controls
Security Controls that are focused on the decision-making and the management of risk
24
New cards
Operational Controls
Focused on things done by people
25
New cards
Technical Controls
Logical controls that are put into a system to help secure it
26
New cards
Preventative Controls
Security Controls that are installed before an event happens and are designed to prevent something from occurring
27
New cards
Detective Controls
Used during the event to find out whether something bad might be happening
28
New cards
Corrective Controls
Used after an event occurs
29
New cards
Compensating Control
used whenever you can't meet the requirements for a normal control.
30
New cards
External Risk
Risks that are produced by a non-human source and are beyond human control
31
New cards
Internal Risk
Risks that are formed within the organization, arise during normal operations, and are often forecastable
32
New cards
Legacy Systems
An old method, technology, computer system, or application program which includes an outdated computer system still in use
33
New cards
Multiparty
A risk that refers to the connection of multiple systems or organizations with each bringing their own inherent risks
34
New cards
Intellectual property (IP) Theft
Risk associated with business assets and property being stolen from an organization in which economic damage, the loss of a competitive edge, or a slowdown in business growth occurs
35
New cards
Software Compliance/Licensing
Risk Associated with a company not being aware of what software or components are installed within its network