Chapter 2: IT Risk Assessment Flashcards
(203 cards)
How does risk identification begin?
By documenting the assets of the organization and determining the value of an asset
Risk identification also includes…
Documenting threats that could pose a risk of damage to the organization
What is risk assessment?
A process used to identify and evaluate risk and its potential effects
Statistical inference that uses prior distribution data to determine the probability of a result
Bayesian Analysis
Provides a diagram to communicate risk assessment results by displaying links between possible causes, controls, and consequences. The cause of the event is depicted in the middle of the diagram and triggers, controls, mitigation strategies, and consequences branch off the knot.
Bow Tie Analysis
The purpose of this is to gather a large group of types of potential risk or ideas
Brainstorming/ Structured Interview
The process to determine the impact of losing the support of any resource
Business Impact Analysis
Combines the technique of a fault tree analysis and and even tree analysis and allows for time delays to be considered
Cause and Consequence Analysis
Looks at the factors that contributed to a certain effect and groups the causes into categories which are then displayed using a diagram
Cause-and-effect Analysis
List of potential or typical threats or other considerations that should be of interest to the organization
Checklists
Uses expert opinion which is often received using two or more rounds of questionnaires
Delphi Method
A forward, bottom up model that uses inductive reasoning to assess the probability of different events resulting in possible outcomes
Event Tree Analysis
Starts with an event and examines possible means for the event to occur and displays these results in a logical tree diagram
Fault Tree Analysis
Originally developed for the food safety industry for proactively preventing risk and assuring quality, reliability, and safety of processes
Hazard Analysis and Critical Control Points (HACCP)
A structured means of identifying and evaluating potential risk by looking at possible deviations from existing processes
Hazard and Operability Studies (HAZOP)
Examines the effect of human error on systems and their performance
Human Reliability Analysis (HRA)
A semiquantitative risk analysis technique that uses aspects of HAZOP data to determine risk associated with risk events. Also looks at controls and their effectiveness.
Layers of Protection Analysis (LOPA)
Used to analyze systems that can exist in multiple states and assumes that future events are independent of past events
Markov Analysis
A simulation used to establish the aggregate variation in a system resulting from variations in the system, for a number of inputs, where each input has a defined distribution and the inputs are related to the output via defined relationships
Monte Carlo Analysis
Looks at what threats or hazards may harm an organization’s activities, facilities, or systems
Preliminary Hazard Analysis
Analyzes the functions and potential failures of a specific asset, particularly a physical asset such as equipment
Reliability-centered Maintenance
Examines possible future scenarios that were identified during risk identification
Scenario Analysis
Used to identidy design errors or sneak conditions- latent hardware, software, or integrated conditions that may cause an unwanted event to occur
Sneak Circuit Analysis
Uses structured brainstorming to identify risk, typically within a facilitated workshop
Structured “What If” Analysis