Chapter 8: Using Risk Management Tools Flashcards
(130 cards)
What is Risk?
The likelihood that a threat will exploit a vulnerability.
What is Vulnerability?
A weakness in a system, application, or process.
What is Impact?
The magnitude of harm that can be caused if a threat exploits a vulnerability.
What is Probability?
How often we expect risk to occur, if at all.
Can you totally eliminate risk?
NOPE.
What is a Threat?
A potential danger that might take advantage of a vulnerability. It’s any circumstance or event that can compromise an organization’s CIA.
What are examples of Threats?
Malicious Human Threats, Accidental Human Threats, and Environmental Threats.
What are Malicious Human Threats?
Intentional harmful actions by a individual, such as hackers or insiders, aiming to damage or exploit systems.
What are Accidental Human Threats?
Unintentional actions by users that cause harm, like mistakes or falling for scams.
What are Environmental Threats?
Natural events (like fire, floods, or storms) that can damage IT infrastructure.
What is Threat Assessment?
The process of identifying and evaluating potential threats to determine risk.
What is Risk Identification?
The process of pinpointing potential risks that could impact an organization.
What are some Risk Types?
Internal, External, Intellectual Property Theft, Software Compliance/Licensing, Legacy Systems and Legacy Platforms.
What is an Internal Risk?
A risk that arises from within the organization, like insider threats or system errors.
What is an External Risk?
A risk that originates outside the organization, like cyberattacks or vendor failures.
What is Intellectual Property (IP) Theft?
Stealing or using someone’s protected creations, like code or trade secrets, without permission.
What is Software Compliance/Licensing?
Following legal software usage rules to avoid penalties or legal issues.
What risk do Legacy Systems/Platforms pose?
They may lack updates or support, increasing security and operational vulnerabilities.
What are some examples of Vulnerabilities?
Default Configuration, Lack of Malware Protection or Dated Definitions, Improper or Weak Patch Management, Lack of Firewalls, or Lack of Organizational Policy.
What is Risk Management?
The process of identifying, evaluating, and mitigating risks to reduce harm to the organization.
What is Risk Awareness?
Awareness of existing and potential threats within a system and the need to address and mitigate them.
What is Inherent Risk?
The risk present before applying any mitigation or controls.
What is Residual Risk?
The risk that remains after controls have been applied.
What is Control Risk?
The risk of a control failing to mitigate or detect a threat.