Chapter 2 Flashcards

Retain (39 cards)

1
Q

Anything used in a business process or task.

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The value assigned to an asset based on importance to the organization, use in critical processes, actual cost, & nonmonetary costs (time, attention, productivity)

A

Asset Valuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any potential occurence that may cause an undesirable or unwanted outcome for a specific asset

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

People or Programs, hardware or systems that intentionally exploit vulnerabilities

A

Threat Agent/Actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The effort to increase the knowledge of risks within an organization

A

Risk Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Evaluating countermeasures, safeguards & security controls using a cost/benefit analysis; adjusting findings & providing a proposal of response options

A

Risk Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The examination of an environment for risks, evaluating each threate event as to its likelihood of occuring and the severity of the damage it would cause if it did occur, and assessing the cost of various countermeasures for each risk.

A

Risk Assessment or Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Primary Goal of Risk Management?

A

To reduce risk to an acceptable level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A detailed process identifying factors that could damage or disclose assets, evaluating those factors in light of asset value and countermeasure cost, and implementing cost-effective solutions for mitigating or reducing risk.

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Keeps communications and contracts confidential, requires encrypted and authenticated transactions, and maintains a detailed activity log of events related to vendors and suppliers.

A

VMS (Vendor Management System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A Software solution that assists with managing and procuring staffing services, hardware and software and other needed products and services.

A

Vendor Management System (VMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False? Vendors, consultants and contractors also represent an increase in the risk of trade secret, theft or espionage?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Supports the tenets of your security policy and infrastructure rather than being in conflict with them. Which could introduce weak points, vulnerabilities, or exceptions.

A

SLA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An important part of Risk Reduction & Risk Avoidance

A

SLA’s, Vendor, Consultant & Contractor Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False? SLA’s are NOT an important factor when using any type of third-party service provider, including cloud services?

A

False,

SLAS are an important factor when using any type of third-party service provider, including cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Level of Risk an organization is able to shoulder.

A

Risk Capacity

17
Q

The “total amount” of risk that an organization is willing to shoulder in aggregate across all assets.

A

Risk Appetite

18
Q

Mitigation or Reduction
Assignment or transfer
Deterrence
Avoidance
Acceptance
Reject or Ignore

Are all part of what?

A

Possible Risk Responses

19
Q

Used to identify the risks and set criticality priorities

A

Risk Assesment

20
Q

Used to determine the best defense for each identified risk

A

Risk Response

21
Q

True or False - Qualitative analysis Employs Math Functions?

22
Q

True or False - Quantitative Analysis Uses Cost/Benefit analysis.

23
Q

An amalgamation of intangible and tangible value multiplied by a future prediction of loss multiplied by a future prediction of likelihood.

24
Q

How is ALE calculated? (2 Options)

A

ALE =SLEARO
or
ALE=AV
EF*ARO

25
Name (in order) the Six Major Elelements of Quantitative Risk Analysis.
Asset Value (AV) Calculate Exposure Factor (EF) Calculate Single Loss Expectancy (SLE) Assess the ARO Derive the ALE Perform cost/benefit analysis of countermeasures
26
Represents the percentage of loss that an organization would experience if a specific asset were violated by a realized risk.
Exposure Factor
27
Also known as Cyber Insurance or Cyber Risk Insurance, a type of insurance policy that provides coverage and financial protection to organizations or individuals in the even of cyber-related incidents.
Cybersecurity Insurance
28
This type of Risk is introduced by the introduction of the countermeasure to an environment.
Control Risk
29
total risk - controls gap = residual risk True or False?
True
30
The amount of risk that is reduced by implementing safegaurds
Controls Gap
31
The amount of risk an organization would face if no safeguards were implemented
Total Risk
32
The type of risk that consists of threats to specific assets against which upper management chooses not to implement a response
Residual Risk
33
This type of Risk is the level of natural risk in an envi. system or product before any risk management efforts are performed.
Inherent Risk
34
An unacceptable possible response to Risk
Risk Rejection
35
This type of Risk is the result after a cost/benefit analysis shows countermeasure costs that would outweigh the possible cost of loss due to a risk
Risk Acceptance
36
The process of selecting alternate options or activities that have less associated risk that the default, common, expedient or cheap option
Risk Avoidance
37
The process of implementing deterrents to violators of security & policy.
Risk Deterrence
38
The placement of the responsibility of loss due to a risk onto another entity or organization
Risk Assignment
39
The implementation of safeguards, security controls, and countermeasures to reduce and/or eliminate vulnerabilities or block threats. (Risk Response)
Risk Mitigation