17 Risk Management & Privacy Flashcards

(13 cards)

1
Q

What helps organizations prioritize cybersecurity efforts?

A

Risk identification and assessment

This process involves identifying all risks and conducting a business impact analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do cybersecurity analysts conduct to assess the potential degree of risk?

A

Business impact analysis

This analysis is based on the probability of occurrence and the magnitude of potential effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a source of external risk for organizations?

A

Vendors

Organizations should conduct supply chain assessments to mitigate risks from vendors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What reduces the likelihood that a previously unidentified risk at a vendor will negatively impact the organization?

A

Vendor due diligence

This involves assessing the vendor’s systems as part of risk assessment practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What technique verifies that hardware was not tampered with after leaving the vendor’s premises?

A

Hardware source authenticity techniques

Hardware-based authentication techniques use physical devices to verify a user’s identity, adding an extra layer of security beyond passwords. These methods often involve cryptographic tokens or smart cards that generate one-time passwords or digital signatures to authenticate users. Examples include USB tokens, keyfobs, and smart cards.

These techniques are crucial for ensuring the integrity of hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name one risk management strategy that changes business practices to make a risk irrelevant.

A

Risk avoidance

This strategy modifies practices to eliminate the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are techniques that seek to reduce the probability or magnitude of a risk called?

A

Risk mitigation techniques

These techniques aim to lessen the impact or chance of risks occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What approach moves some of the risk to a third party?

A

Risk transference

This strategy involves outsourcing certain risks to external entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does risk acceptance acknowledge?

A

The presence of the risk

Organizations continue normal operations despite the risk being acknowledged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does disaster recovery planning aim to build?

A

Resiliency

This planning is activated during natural or human-made disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a disaster recovery plan help an organization do?

A

Quickly recover its information and systems

The plan is essential for resuming normal operations after a disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should organizations develop to protect sensitive personal information?

A

Privacy programs

These programs protect personal information from misuse and unauthorized disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What types of information should privacy programs cover?

A
  • Personally identifiable information (PII)
  • Protected health information (PHI)
  • Financial information
  • Other records impacting personal privacy

These elements are crucial for maintaining individual privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly