Topic 6 Flashcards

Risk management - controlling risk

1
Q

What are the five risk treatment strategies discussed in this topic?

A

The five risk treatment strategies presented in this topic are defense, transference, mitigation, acceptance, and termination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the strategy of defense.

A

The risk treatment strategy of defense is the application of safeguards that eliminate or reduce the remaining uncontrolled risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the strategy of transference.

A

The risk treatment strategy of transference is the shifting of risks to other areas or to outside entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the strategy of mitigation.

A

The risk treatment strategy of mitigation is the reduction of a risk’s impact after a successful attack by preparing for its occurrence and the immediate actions needed to ameliorate the consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the strategy of acceptance.

A

The risk treatment strategy of acceptance is an understanding of the consequences and acknowledgment of the risk by the proper level of authority, without any attempt at control or mitigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the strategy of termination.

A

Termination is the risk treatment strategy that eliminates all risk associated with an information asset by removing that asset from service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe residual risk.

A

Residual risk is the “leftover” risk that is not completely removed, shifted, or included in planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What conditions must be met to ensure that risk acceptance has been used properly?

A

Risk acceptance has been used properly if the level of risk posed to the asset has been determined, the probability of attack and the likelihood of a successful exploitation of a vulnerability has been assessed, the annual rate of occurrence of such an attack has been approximated, the potential loss that could result from attacks has been estimated, a thorough cost-benefit analysis has been performed, controls using each appropriate type of feasibility have been evaluated, or it has been decided that the particular function, service, information, or asset did not justify the cost of protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is risk appetite? Explain why risk appetite varies from organization to organization.

A

Risk appetite is the amount of risk an organization is willing to accept as it evaluates the trade-off between perfect security and unlimited accessibility. Risk appetite varies from organization to organization because of differences in their size, budget, culture, and the value placed on certain assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between benchmarking and baselining?

A

Benchmarking is the process of comparing one’s company with other companies that are seeking the same results, whereas baselining is the process of standardizing a company’s own results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly