Chapter 1: IT Risk Identification Flashcards
IT Risk Management Good Practices
- COBIT 5
- ISO/IEC 27005: 2011 - IT - Security techniques-Information security risk management
- ISO31000:2009- Risk Management Principles and Guidelines
- NIST Special Publication 800-30 Revision 1: Guide for Conducting Risk Assessments
- NIST Special Publication 800-39: Managing Information Security Risk
Enumerate the ISO/IEC27005 Process Steps
- Context Establishment
- Risk Assessment
- Risk Identification
- Risk Analysis
- Risk Evaluation
- Risk Treatment
- Risk Acceptance
- Risk Communication and Consultation
- Risk Monitoring and Review
The IT Risk Management program should be:
- Comprehensive
- Complete
- Auditable
- Justifiable
- Legal
- Monitored
- Up to date
- Managed
Ways to identify risk
- Historical or evidence-based methods
- Systematic approach (expert opinion)
- Inductive approach (theoretical analysis)
Enumerate the business related IT risk types
- Investment or expense risk
- Access or security risk
- Integrity risk
- Relevance risk
- Availability risk
- Infrastructure risk
- Project ownership risk
Investment or expense risk
Risk that the IT investment fails to provide value for money or is otherwise excessive or wasteful
Access or security risk
Risk that confidential or otherwise sensitive information may be divulged or made available to those without appropriate authority
Integrity risk
Risk that data cannot be relied on because they are unauthorized, incomplete, or inaccurate
Relevance risk
Risk associated with not getting the right information to the right people at the right time to allow the right action to be taken
Availability risk
Risk of loss of service or risk that data are not available when needed
Infrastructure risk
Risk that the enterprise does not have an IT infrastructure and systems that can effectively support the current and future needs of the business in an efficient,cost - effective, and well-controlled fashion
Project ownership risk
Risk of IT projects failing to meet objectives due to lack of accountability and commitment
Challenges in conducting interviews:
- Exaggeration
2. Inaccuracies
Important detail to obtain during the interview
the level of impact that previous incidents have had on the organization including how the incident was handled, results of post incident review and root cause analysis and current status of any noted remediation activities from prior activities
Risk culture
Reflects the balance between weighing the negative, positive, and regulatory elements of risk
Risk culture elements
- Behavior toward taking risk
- Behavior toward policy compliance
- Behavior toward negative outcomes
Symptoms of inadequate or problematic risk culture
- Misalignment between real risk appetite and translation into policies
- Existence of a blame culture
Consequences of poor communication on risk:
- A false sense of confidence at all levels of the enterprise
- Lack of direction or strategic planning
- Unbalanced communication to the external world on risk
- The perception that the enterprise is trying to cover up known risk from stakeholders
IT Risk is…
the IT-enabled business risk that stems from the use of IT
Senior management support
An important part of the risk management process
Risk management depends on
business goals and objectives
What is a critical component of risk management?
History
Merger or acquisition results in
emergence of new risks that creates uncertainty and stress. This can further result in poor judgment or inappropriate actions by personnel
What influences the effectiveness of the risk management effort?
The positioning of risk management function within the organizational structure.