5.4 Summarize risk management processes and concepts. Flashcards

1
Q

Control Risk

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Residual Risk

A

– Inherent risk + control effectiveness
– Risk that exists after controls are considered
– Some models base it on including additional controls

After adding a firewall or ID or IPS what is your risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Inherent Risk

A

– Impact + Likelihood
– Risk that exists in the absence of controls
– Some models include the existing set of controls

Without anything being put in place, there would be a certain amount of risk we would undertake. Even including your current set of controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Acceptance

A

Its a Business decision, we will accept the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk Avoidance

A

Stop participating in high-risk activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transference

A

Choosing to purchase cyber security insurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mitigation

A

Decrease risk level by investing in security systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk register

A

Identify and document the risk associated within eachstep of the project
Every project has a plan, but also has risk
– Identify and document the risk associated
with each step
– Apply possible solutions to the identified risks
– Monitor the results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk matrix/ Risk heat map

A

View the results of the risk assessment
– Visually identify risk based on color
– Combines the likelihood of an event with
the potential impact
– Assists with making strategic decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk appetite

A

– The amount of risk an organization is willing to take

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Qualitative Risk assessment

A

Identify significant risk factors
– Ask opinions about the significance
– Display visually with traffic light grid or
similar method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Quantitative assessment

A

Likelihood
– Annualized Rate of Occurrence (ARO)
– How likely is it that a hurricane will hit?
In Montana? In Florida?
* SLE (Single Loss Expectancy)
– What is the monetary loss if a single event occurs?
– Laptop stolen (asset value or AV) = $1,000
* ALE (Annualized Loss Expectancy)
– ARO x SLE
– Seven laptops stolen a year (ARO) x
$1,000 (SLE) = $7,000
* The business impact can be more than monetary
– Quantitative vs. qualitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Disaster Types

A

Environmental threats
– Tornado, hurricane, earthquake, severe weather
* Person-made threats
– Human intent, negligence, or error
– Arson, crime, civil disorder, fires, riots, etc.
* Internal and external
– Internal threats are from employees
– External threats are from outside the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RTO

A

Recovery time objective (RTO)
– Get up and running quickly
– Get back to a particular service level

Does not mean complete recovery, just to a certain time. Usually USD in conjunction with RPO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RPO

A

Recovery point objective (RPO)
– How much data loss is acceptable?
– Bring the system back online; how far back
does data go?

The point at which we say we have recovered. This objective meats a certain set of requirements to say we have recovered enough.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MTTR

A

Mean time to repair (MTTR)
– Time required to fix the issue

17
Q

MTBF

A

Mean time between failures (MTBF)
– Predict the time between outages

18
Q

DRP

A

Disaster recovery plan (DRP)
* Detailed plan for resuming operations after a disaster
– Application, data center, building, campus, region, etc.
* Extensive planning prior to the disaster
– Backups
– Off-site data replication
– Cloud alternatives
– Remote site
* Many third-party options
– Physical locations
– Recovery services

19
Q
A