Chapter 1 Risk Management Flashcards
(205 cards)
An item of value to an institution, such as data, hardware, software, or physical property. An asset is an item or collection of items that has a quantitative (numeric) or qualitative (subjective) value to a company.
Asset
The probability or likelihood of the occurrence or realization of a threat.
Risk
A weakness in hardware, software, or components that may be exploited in order for a threat to destroy, damage, or compromise an asset.
Vulnerability
Any agent, condition, or circumstance that could potentially cause harm, loss, damage, or compromise to an IT asset or data asset.
Threat
Probability of occurrence or the odds that the event will actually occur.
Likelihood of Threat
Driving force behind the activity.
Motivation
What are some common motivations of risk activities such as hacking?
prestige, money, fame, and challenge
What are some examples of Internal Risk?
- disgruntled employee
- failed hard drive
What are some examples of External Risk?
- Natural disasters such as floods
- Person-made events such as strikes and protests
Internal or external cause of risk
Risk Source
Events over which we have no control, such as bad weather (hurricanes, snowstorms, tornadoes), fires, floods, earthquakes, and tsunamis, but could also include global events like pandemics.
Natural Disaster
All forms of damaging programs, such as viruses, worms, Trojans, keyloggers, and so forth. This software is distinguishable in that it is developed to damage, alter, expose, or destroy a system or data. For example, viruses are executable programs that can replicate and attach to and infect other executable objects. Some viruses also perform destructive or discreet activities (payload) after replication and infection are accomplished.
Malicious Code
Instigated by a trusted insider or an untrusted outsider. Intruders, vandals, and thieves remove sensitive information, destroy data, or physically damage or remove hardware such as hard drives and mobile devices.
Breach of Physical Security
Stolen, lost, damaged, or modified data. Loss or damage to an organization’s data can be a critical threat if there are no backups or external archiving of the data as part of the organization’s data recovery and business continuity plan. Also, if the compromised data is of a confidential nature, this can also be a critical threat to the organization, depending on the potential damage that can arise from this compromise.
Hacker Attack
Attack on a network or web-based system is designed to bring down the network or prevent access to a particular device by flooding it with useless traffic. Can be launched in several ways. What was done manually with simple tools before is now automated and coordinated, on a massive scale with multiple systems.
Distributed Denial of Service (DDoS) Attack
When attackers use computers, Internet communications, and other cyber tools to penetrate and disrupt critical national infrastructures such as water, electric, and gas plants; oil and gasoline refineries; nuclear power plants; waste management plants; and so on.
Cyberterrorism
Identify weaknesses and gaps in the deployment of controls and to identify more accurately what areas require the highest level of protection.
Risk Assessment
Process of identifying all of the organization’s assets.
Asset Identification
What are the two types of assets?
Tangible and Intangible
What are some types of tangible assets?
Documentation, Data, Hardware, Software
What are some types of intangible assets?
Reputation, Services, Knowledge
What are the 5 aspects of the Risk Assessment Process?
- Asset Identification
- Information Classification
- Risk Assessment
- Risk Analysis
- Implementing Controls
What is the CIA Security Triad?
Confidentiality, Integrity, and Availability
Strengthens the organization in many ways. Labeling information secret or strictly confidential helps employees see the value of the information and give it a higher standard of care.
Information Classification