Lession 1 Flashcards

(35 cards)

1
Q

What is the primary focus of the Organizational Security course?

A

Protecting organizations and society from cybersecurity threats and managing risk to support successful accomplishment of the organization’s mission and society at large.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key concepts related to the impact of cybercrimes on society?

A
  • Cyber law
  • Ethics
  • Policy
  • Privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the aim of the unit on risk management?

A

To help students understand how risks can be managed in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define risk management.

A

The process of identifying, assessing, and controlling threats to an organization’s capital and earnings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List some sources of risks faced by organizations.

A
  • Financial uncertainties
  • Legal liabilities
  • Technology issues
  • Strategic management errors
  • Accidents
  • Natural disasters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is enterprise risk management (ERM)?

A

A holistic approach to managing risk that emphasizes anticipating and understanding risk across an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the aim of a risk management program?

A

To preserve and add to enterprise value by making smart risk decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does ‘risk appetite’ refer to?

A

The amount of risk an organization is willing to accept to realize its objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: Risk management aims to eliminate all risks.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is risk management increasingly important in modern organizations?

A

Risks have grown more complex due to globalization and the pervasive use of digital technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What has been dubbed a ‘threat multiplier’ by risk experts?

A

Climate change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some adjustments businesses made in response to the coronavirus pandemic?

A
  • Adjusting employee return plans
  • Making supply chains less vulnerable to crises
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two types of risk management approaches compared in the text?

A
  • Traditional risk management
  • Enterprise risk management (ERM)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List the five basic techniques of risk management.

A
  • Avoidance
  • Retention
  • Spreading
  • Loss Prevention and Reduction
  • Transfer (through Insurance and Contracts)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is risk avoidance?

A

Not allowing exposure to risk, such as not releasing vehicles during severe weather.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain risk retention.

A

Choosing to retain a risk or a portion of it because it may be cost-effective.

17
Q

What is loss prevention and reduction?

A

Minimizing the effect of loss in terms of frequency and severity.

18
Q

How can risk be transferred?

A

By contract or insurance, shifting financial risk from one entity to another.

19
Q

What is the purpose of hold harmless or indemnification clauses in contracts?

A

To release vendors and service providers from liability for their actions.

20
Q

What does risk identification help businesses achieve?

A

Understanding potential risks and creating solutions to challenges.

21
Q

Why is risk identification important?

A
  • Identifying industry challenges
  • Meeting legal standards
  • Appealing to investors
  • Making projects more efficient
22
Q

What is the NGT technique?

A

Nominal Group Technique, a method of brainstorming where participants write ideas individually before discussing them.

23
Q

What does a SWOT analysis evaluate?

A
  • Strengths
  • Weaknesses
  • Opportunities
  • Threats
24
Q

What are common risk factors for information assets?

A
  • Cyberattacks
  • Human error
  • Natural disasters
  • Supply chain vulnerabilities
  • Regulatory compliance
25
Define risk assessment.
The process of identifying, analyzing, and evaluating risks to information assets.
26
What can damage physical equipment or disrupt network infrastructure?
Environmental factors ## Footnote This includes issues like power outages, floods, or fires.
27
What are supply chain vulnerabilities?
Third-party vendors or suppliers may have their own security weaknesses that could compromise the security of information assets. ## Footnote These vulnerabilities can lead to risks in the information security of an organization.
28
What is the consequence of non-compliance with laws and regulations related to data protection?
Legal and financial risks ## Footnote This includes potential fines and legal action against an organization.
29
What is risk assessment?
The process of identifying, analyzing, and evaluating risks to information assets. ## Footnote The goal is to determine likelihood and potential impact of risks.
30
What is the first step in the risk assessment process?
Asset identification ## Footnote This involves identifying and documenting the information about assets that need to be protected.
31
What is involved in threat identification?
Identifying potential threats to the assets, such as cyberattacks, natural disasters, or human error. ## Footnote This step is crucial for understanding the context of risks.
32
What does vulnerability assessment entail?
Assessing the vulnerabilities or weaknesses of the assets and the systems that support them. ## Footnote This helps to identify potential points of failure.
33
What is risk analysis?
Analyzing the likelihood and potential impact of each risk and prioritizing them based on their severity. ## Footnote This is essential for effective risk management.
34
What is the purpose of risk management?
To develop strategies to mitigate or manage the risks. ## Footnote This can include implementing security controls or developing contingency plans.
35
What does risk monitoring involve?
Regularly reviewing and updating the risk assessment to ensure that the strategies remain effective. ## Footnote This is important for adapting to changes in the risk landscape.