Risk Management Flashcards

1
Q

Refers to the protection of personal or organizational information or information resources from unauthorized access, attacks, theft, or data damage.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Anything of value that could be compromised, stolen, or harmed, including information, physical resources, and reputation.

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any event or action that could potentially cause damage to an asset or an interruption of services.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The intentional act of attempting to bypass one or more security services or controls of an information system.

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A condition that leaves the system and its assets open to harm — including such things as software bugs, insecure passwords, inadequate physical security, and poorly designed networks.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technique that takes advantage of a vulnerability to perform an attack.

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A countermeasure that you put in place to avoid, mitigate, or counteract security risks due to threats or attacks.

A

Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is a measure of your exposure to the chance of damage or loss. Is often associated with the loss of a system, power, or network and other physical losses. Also affects people, practices, and processes.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is something or someone that can take advantage of vulnerabilities.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is a weakness or deficiency that enables an attacker to violate the integrity of the system.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is damage that occurs because the threat took advantage of the vulnerability.

A

Consequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is typically defined as the cyclical process of identifying, assessing, analyzing, and responding to risks.

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The comprehensive process of evaluating, measuring, and mitigating the many risks that pervade an organization.

A

Enterprise Risk Management (ERM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is the property that dictates how susceptible an organization is to loss.

A

Risk Exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is the security process used for assessing risk damages that can affect an organization.

A

Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Analysis methods use descriptions and words to measure the likelihood and impact of risk. For example, impact ratings can be severe/high, moderate/medium, or low. In a similar manner, likelihood ratings can be likely, unlikely, or rare.

A

Qualitative

17
Q

Analysis is based completely on numeric values. Data is analyzed using historical records, experiences, industry best practices and records, statistical theories, testing, and experiments. The goal of this analysis is to calculate the probable loss for every risk.

A

Quantitative

18
Q

Analysis method exists because it’s impossible for a purely quantitative risk assessment to exist given that some issues defy numbers. This analysis attempts to find a middle ground between the previous two risk analysis types to create a hybrid method.

A

Semi-quantitative

19
Q

Are high-level statements that identifies the organization’s intentions. Are interpreted and made operational through standards, guidelines, and procedures.

A

Policy/Policies

20
Q

It consist of specific low-level mandatory controls that help enforce and support policies.

A

Standards

21
Q

Are recommended, non-mandatory controls that support standards or that provide a reference for decision making when no applicable standard exists.

A

Guidelines

22
Q

Are step-by-step instructions on tasks required to implement various policies, standards, and guidelines.

A

Procedures

23
Q

Specifies rules for responding to security incidents before, during, and after they occur.

A

Incident response policy

24
Q

Defines a set of rules and restrictions for how various internal and external stakeholders may behave with respect to the organization’s assets.

A

Acceptable use policy

25
Q

Outlines the responsibilities that administrators have in keeping various identity data secure and supportive of business objectives. Such policies define expected behavior in how an external or internal user’s identity is created, altered, and deleted with respect to organizational systems.

A

Account management policy

26
Q

Often a subset of an account management policy that defines rules for how users generate and maintain account credentials.

A

Password policy

27
Q

Outlines how information in the organization is assigned to “owners” — that is, to personnel ultimately responsible for keeping that information secure and accessible by authorized parties only.

A

Data ownership policy

28
Q

Outlines how an organization chooses to categorize the different levels of data sensitivity. The organization can triage its security efforts based on what data will bring the most risk if it were leaked or tampered with.

A

Data classification policy

29
Q
A