1.Learning Aim C2 Flashcards

(17 cards)

1
Q

What is a risk in the context of cybersecurity?

A

A threat that could result in some form of loss at some point in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is it important to assess risks to a system or network?

A

To put appropriate methods in place to prevent or mitigate these risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the measures for risk severity?

A

Low, Medium, High, Extreme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What factors affect the probability of a threat occurring?

A
  • How easy it is to perform
  • How big is the potential reward
  • How likely it is to be caught
  • How well known or easy to discover is the vulnerability being exploited
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three key values for quantifying the probability of threats?

A
  • Unlikely
  • Likely
  • Very Likely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is the impact level of a threat determined?

A

Based on data loss, restoration time, potential data theft, and financial/reputational harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three key values for quantifying the impact level of threats?

A
  • Minor
  • Moderate
  • Major
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the formula for calculating risk severity?

A

Risk severity = probability of the threat occurring × expected impact level/value of the loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a risk severity matrix help to determine?

A

The risk severity of each individual threat and quantifies their importance/priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the consequences of a threat classified as extreme?

A

It will require the organization to spend potentially very large sums to ensure the threat will not occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is a risk assessment a one-time task?

A

False. Risk assessments are ongoing and need to be performed regularly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the first step in a risk assessment method?

A

Identify Possible Threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of documenting a risk assessment?

A

To refer to it later when producing a security plan and to justify expenditure on preventative measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the standard headings in a risk assessment document?

A
  • Threat Number
  • Threat Title
  • Probability
  • Impact Level
  • Risk Severity
  • Explanation of the Threat in Context
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blank: The likelihood of a threat occurring can be classified as _______.

A

Unlikely, Likely, Very Likely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the importance of having a standardized approach in risk assessments?

A

To ensure consistency in the assessments.

17
Q

What should be included in the explanation of the threat in context?

A

A detailed explanation of the threat linked to the business context.