Chapter 17 - Risk Management and Privacy Flashcards

1
Q

Enterprise Risk Management (ERM)

A

Enterprise Risk Management programs have organizations take a formal approach to risk analysis that begins with identifying risks, continues with determining the severity of each risk, and then results in adopting one or more risk management strategies to address each risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threats

A

Threats are any possible events that might have an adverse impact on the confidentiality, integrity, and/or availability of our information or information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vulnerabilities

A

Vulnerabilities are weaknesses in our systems or controls that could be exploited by a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risks

A

Risks occur at the intersection of a vulnerability and a threat that might exploit that vulnerability. A threat without a corresponding vulnerability does not pose a Risk, nor vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk Identification Process

A

The Risk Identification Process requires identifying the threats and vulnerabilities that exist in your operating environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

External Risks

A

External Risks are those risks that originate from a source outside the organization. This is an extremely broad category of risk, including cybersecurity adversaries, malicious code, and natural disasters, among many other types of risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internal Risks

A

Internal Risks are those risks that originate from within the organization. They include malicious insiders, mistakes made by authorized users, equipment failures, and similar risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Multiparty Risks

A

Multiparty Risks are those that impact more than one organization. For example, a power outage to a city block affects all the buildings on that block. Similarly, the compromise of an SaaS provider’s database is a multiparty risk because it compromises the information of many different customers of the SaaS provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Legacy Systems

A

Legacy Systems pose a unique type of risk to organizations. These outdated systems often do not receive security updates and cybersecurity professionals must take extraordinary measures to protect them against unpatchable vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intellectual Property (IP) Theft

A

Intellectual Property (IP) Theft risks occur when a company possesses trade secrets or other proprietary information that, if disclosed, could compromise the organization’s business advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Software Compliance/Licensing Risks

A

Software Compliance/Licensing Risks occur when an organization licenses software from a vendor and intentionally or accidentally runs afoul of usage limitations that expose the customer to financial and legal risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Likelihood of Occurrence/Probability

A

Likelihood of Occurrence refers to the chances of the risk actually occurring. This could be expressed as the percent of chance that a threat will exploit a vulnerability over a specified period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Impact

A

In risk assessment, Impact refers to the gravity of the effects that the risk would have on the organization if it did occur. This is often expressed as a financial cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Severity Formula

A

Risk Severity = Likelihood * Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Continuous Risk Assessments

A

Continuous Risk Assessments involve ongoing monitoring and analysis of risks. This can include automated systems that constantly scan for new threats or changes in the risk environment, as well as regular reviews and updates to the risk management strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Recurring Risk Assessments

A

Recurring Risk Assessments are performed at regular intervals, such as annually or quarterly. These assessments are meant to track the evolution of risks over time, monitor changes in the risk profile, and ensure that risk management practices are adapting to new threats and vulnerabilities.

17
Q

Ad hoc Risk Assessments

A

Ad hoc Risk Assessments are conducted in response to a specific event or situation, such as a new project, technology implementation, or significant change in the business environment.

18
Q

What are the steps to performing Quantitative Risk Analysis?

A
  1. Determine the asset value (AV) or the asset affected by the risk.
  2. Determine the likelihood that the risk will occur calculating the annualized rate of occurrence (ARO) for the risk.
  3. Determine the amount of damage that will occur to the asset if the risk materializes. This is called the exposure factor (EF).
  4. Calculate the single loss expectancy (SLE). This is the amount of financial damage expected each time a risk materializes.
  5. Calculate the annualized loss expectancy (ALE). This is the amount of damage expected from a risk each year.
19
Q

Risk Mitigation

A

Risk Mitigation is the process of applying security controls to reduce the probability and/or magnitude of a risk.

20
Q

Risk Avoidance

A

Risk Avoidance is a risk management strategy where we change our business practices to completely eliminate the potential that a risk will materialize.

21
Q

Risk Transference

A

Risk Transference shifts some of the impact of a risk from the organization experiencing the risk to another entity. The most common example of risk transference is purchasing an insurance policy that covers a risk. When purchasing insurance, the customer pays a premium to the insurance carrier. In exchange, the insurance carrier agrees to cover losses from risks specified in the policy.

22
Q

Risk Acceptance

A

Risk Acceptance boils down to deliberately choosing to take no other risk management strategy and to simply continue operations as normal in the face of the risk.

23
Q

Risk Appetite

A

Risk Appetite is the level of risk that an organization is willing to accept as a cost of doing business.

24
Q

Risk Register

A

The Risk Register is the primary tool that risk management professionals use to track risks facing the organization.

25
Q

Key Risk Indicator (KRI)

A

Key Risk Indicators are metrics used to measure and provide early warning signals for increasing levels of risk. These indicators help in tracking the effectiveness of risk mitigation efforts and make sure that the residual risk stays within the risk appetite.

26
Q

Risk Owner

A

The Risk Owner is an individual or entity responsible for managing and monitoring risks, including implementing necessary controls and actions to mitigate them.

27
Q

Disaster Recovery Planning (DRP)

A

Disaster Recovery Planning is the discipline of developing plans to recover operations as quickly as possible in the face of a disaster.

28
Q

Business Impact Analysis (BIA)

A

Business Impact Analysis is a formal process designed to identify the mission-essential functions within an organization and facilitate the identification of the critical systems that support those functions.

29
Q

What are the four key metrics used in the business impact analysis process?

A
  1. Mean Time Between Failures (MTBF)
  2. Mean Time to Repair (MTTR)
  3. Recovery Time Objective (RTO)
  4. Recover Point Objective (RPO) [amount of data that the organization can tolerate losing during an outage]
30
Q

Data Inventory

A

A Data Inventory is a list of the type of the types of information maintained by the organization and the places where that data is stored, processed, and transmitted.

31
Q

What are the four major classification categories used by the U.S. Government?

A
  1. Top Secret
  2. Secret
  3. Confidential
  4. Unclassified
32
Q

Right to be Forgotten

A

The Right to be Forgotten allows individuals to request the deletion of personal data about them under certain circumstances. The Right to be Forgotten, also known as the right to erasure, has been implemented in various data protection laws, notably the European Union’s GDPR.

33
Q

Deidentification

A

Deidentification is the process of removing the ability to link data back to an individual, reducing its sensitivity.

34
Q

Data Obfuscation

A

Data Obfuscation is the process of transforming data into a format where the original information can’t be retrieved. Some common tools for Obfuscation are hashing, tokenization, and data masking.