Information Risk Management Flashcards Preview

CISM > Information Risk Management > Flashcards

Flashcards in Information Risk Management Deck (20)
Loading flashcards...
1

What is Risk ?

Risk = Threat * Vulnerability

2

Risk Management Lifecycle is

iterative

3

What is the Lifecycle phases?

IT Risk Identification
IT Risk Assessment
Risk Response And Mitigation
Risk and Control Monitoring and Reporting

4

What are the steps to do Risk Managing as in program management

Identify our Risk Management team
What is in and what is out of scope?
Which methods are we using?
Which tools are we using?
What are the acceptable risk levels, which type of risk appetite do we have in our enterprise?
Identify our assets: Tangible and Intangible

5

What are the steps of Risk Assessment?

Quantitative and Qualitative Risk Analysis
Uncertainty analysis
Everything is done on a cost-benefit analysis
Risk Mitigation/Risk Transference/ Risk Acceptance/ Risk Avoidance
Risk Rejection is NEVER acceptable
We assess the current countermeasures: Are they god enough? Do we need to improve on them? Do we need to implement entirely new countermeasures?

6

Describe Qualitative Risk Analysis

How likely is it to happen and how bad is it if it happens?
This is a vague guess or a feeling, and relatively quick to do. Most often done to know where to focus the Quantitative Risk Analysis

7

Describe Quantitative Risk Analysis

What will actually cost in $? This is fact based analysis, Total $ value of asset, math is involved

8

What is a Threat?

A potentially harmful incident (Tsunami, earthquake, tornado...)

9

What is vulnerability?

A weakness that can allow the threat to do harm. having a data center in the tsunami flood area, not earthquake resistant, not applying patches and antivirus,..

10

How do you describe the Impact?

Can at times be added to give a more full picture. Risk= Threat*Vulnerability*Impact (How bad is it?)

11

What is Total risk defined?

TR= Threat * Vulnerability * Asset Value

12

What is Residual Risk?

Total Risk - Countermeasures

13

What tool is usually used to make a qualitative risk analysis?

A Risk Analysis Matrix usually 6 by 6 where the columns can starts from (left to right) insignificant, Minor, Moderate, Major, and Catastrophic; and the Rows start (top left to bottom left) with Almost Certain, Likely, Possible, unlikely, and Rare

14

How would you rate the loss of a laptop?

How likely is one get stolen or left somewhere? (Possible or Likely) and the risk could be L= Low; M = Medium; H = High; E= Extreme)
How bad if it happens? it would depend if the laptop is encrypted or has PII/PHI content

15

What other tool is also used for qualitative analysis?

Risk Registers: a spreadsheet with the following columns: Category, Name, Risk #, Probability, Impact, Mitigation, Contingency, Risk Score after Mitigation, Action By, and Action When

16

Describe Quantitative Analysis

Is when we want exactly enough security for our needs: This is where we put a number on that. We find the asset's value : How much of it is compromised, how much one incident will cost, how often the incident occurs and how much that is per year.

17

What is AV?

Asset value - How much is the asset worth?

18

What is EF?

Exposure Factor - Percentage of Asset Value Lost?

19

What is SLE - (AV*EF) ?

What does it cost if it happens once?

20

Annual Rate of Occurrence (ARO)

How often will this happen each year?