What is a risk in the context of cybersecurity?
A threat that could result in some form of loss at some point in time.
Why is it important to assess risks to a system or network?
To put appropriate methods in place to prevent or mitigate these risks.
What are the measures for risk severity?
Low, Medium, High, Extreme.
What factors affect the probability of a threat occurring?
What are the three key values for quantifying the probability of threats?
How is the impact level of a threat determined?
Based on data loss, restoration time, potential data theft, and financial/reputational harm.
What are the three key values for quantifying the impact level of threats?
What is the formula for calculating risk severity?
Risk severity = probability of the threat occurring × expected impact level/value of the loss.
What does a risk severity matrix help to determine?
The risk severity of each individual threat and quantifies their importance/priority.
What are the consequences of a threat classified as extreme?
It will require the organization to spend potentially very large sums to ensure the threat will not occur.
Is a risk assessment a one-time task?
False. Risk assessments are ongoing and need to be performed regularly.
What is the first step in a risk assessment method?
Identify Possible Threats.
What is the purpose of documenting a risk assessment?
To refer to it later when producing a security plan and to justify expenditure on preventative measures.
What are the standard headings in a risk assessment document?
Fill in the blank: The likelihood of a threat occurring can be classified as _______.
Unlikely, Likely, Very Likely.
What is the importance of having a standardized approach in risk assessments?
To ensure consistency in the assessments.
What should be included in the explanation of the threat in context?
A detailed explanation of the threat linked to the business context.