CRISC Review Flashcards
Risk Assessment involves two specific requirements
–Risk Identification: Threat plus Vulnerability - Internal or External / Intentional or Unintentional
–Risk Analysis: Impact on system reliability, security and speed and consequence of failure to mitigate identified risks
Risk Monitoring is the process that
systematically tracks and evaluates the performance of risk mitigation actions
The Risk Management structure involves:
planning, assessment (identification-analysis), handling, monitoring and mitigation.
Threats are characterized as those that are
Imminent; those that are Emerging; those that are Consistent and those that are Persistent.
Delphi is
a security risk assessment and information gathering technique that uses the consensus of subject matter experts to determine mission risk
Quantitative Risk Assessment is a process used to
analyze numerically the probability of each risk and its consequence on mission objectives
Quantitative Risk Assessment Techniques include
interviewing, sensitivity analysis, decision tree analysis, and simulation
Qualitative risk analysis is the process of
assessing the impact and likelihood of identified risks. What is the the probability and likelihood that the risk will occur and what is the consequence to mission objectives
The focus of mission centric Risk Analysis should be based on
the economic balance between the impact of risks and the cost of protective measures
Threat and vulnerability assessments typically evaluate
all elements of a business process for threats and vulnerabilities and identify the likelihood of occurrence and the business impact if the threats were to be realized
While defining risk management strategies, the risk control professional needs to
analyze the organizations objectives and risk tolerance and define a risk management framework based on this analysis
The risk assessment is used to
identify and evaluate the impact of failure on critical business processes and to determine time frames, priorities, resources and interdependencies
Countermeasures are selected by
Risk Managers and can counter attacks, reduce inherent risks, resolve vulnerabilities and improve the state of security
Determining manual or automated test and evaluation processes should be based on
organizational requirements
Accepting the Residual Risk is central to
the accreditation authorities decision
Security Features Assessment
Verify/Validate effectiveness of security controls (technical/non-technical)
It is most important to paint a vision for
the future and then draw a road map from the starting point – this requires that the current state and desired future state be fully understood.
Transferring risk involves
shifting some or all of the negative impact of a threat along with ownership to a third party
Identifying the appropriate Risk Analysis tool requires
identifying the requirement, determination, determining data collection, identifying an analytical methodology and determining ROI
Residual Risk can be mitigated by
eliminating or reducing the impact of system threat/vulnerability pair, adding targeted controls to reduce the capacity and motivation of a threat-source, reducing the magnitude of the adverse impact
Risk Management focus on
stipulating Information protection security policy, standards and guidelines and helps to ensure System Security Policies are up-to-date to ensure all significant risks are addressed
Information that is no longer required should be
analyzed under the retention policy to determine whether the organization is required to maintain the data for business, legal or regulatory reasons
Laws and regulations of the country of origin may not be
enforceable in the foreign country
the laws and regulations of a foreign outsourcer may
also impact the enterprise