Lesson 5 Flashcards

(47 cards)

1
Q

The chance of a negative event

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A chance that something unexpected will happen

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is the combination of threats and vulnerabilities

A

Risk = Threats x Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This definition leaves the possibility open that risks can produce positive outcomes. This is no doubt based on the philosophy that problems represent opportunities

A

Risk, ISO 31000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Something bad that might happen

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

From a security perspective the first threat that pops to mind is ?

A

Security Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the range of a threat?

A

It can range from human errors to natural disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 6 categories of threats?

A
  • Acts of human error
  • Compromises of Intellectual Property
  • Deliberate acts of espionage/trespass
  • Deliberate acts of information extortion
  • Deliberate acts of sabotage/vandalism
  • Deliberate acts of theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who said that ‘Vulnerability is the birthplace of innovation, creativity and change’

A

Brene Brown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is common definition of vulnerability?

A

“weakness” or “inability to cope”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A better definition for vulnerability

A

“exposure”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Example of a vulnerability?

A

Connecting a system to the Internet can represent a vulnerability
* It exposes a system to a DDoS (Distributed Denial of Service) attack
* But connecting a system to customers via the Internet isn’t likely to be considered a weakness from a business perspective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IS RISK GOOD OR BAD?

A
  • IT security professionals tend to think of risk as bad. It is the chance a threat will exploit vulnerabilities or the
    “chance that something bad will happen”
  • Risk management professionals treat risks as potentially positive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the process of identifying, analyzing and responding to risk factors
throughout the life of a project and in the best interests of its objectives

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

implies control of possible future events

A

Proper risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is risk management proactive or reactive?

A

proactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Project team reacts to risks when
they occur

A

Reactive Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

plan for additional resources in anticipation of fire
fighting

A

Reactive Risk Management, Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

resources are found and applied when the risk strikes

A

Reactive Risk Management, Fix on Failure

20
Q

failure does not respond to applied resources and project is in jeopardy

A

Reactive Risk Management, Crisis Management

21
Q

Formal risk analysis is performed

A

Proactive Risk Management

22
Q

Organization corrects the root
causes of the risk

A

Proactive Risk Management

23
Q

What are the 7 steps to risk management?

A
  1. Identification
  2. Analysis
  3. Probability and Impact
  4. Risk Treatment
  5. Residual Risk
  6. Risk Control
  7. Monitor and Review
24
Q

Giving all stakeholders an opportunity to identify risks

A

Identification

25
This can increase acceptance of a program or project as everyone is given a chance to document all the things that might go wrong
Identification
26
The diverse perspectives of stakeholders helps to develop a comprehensive list of risks
Identification
27
It is also possible to use databases of issues with that occurred with similar business processes, programs or projects in your industry
Identification
28
Knowledge sources such as lessons-learned and the risk registers of historical projects can also be used
Identification
29
Developing context information for each risk such as moment of risk
Analysis
30
Assessing the probability and impact of each risk
Probability and Impact
31
These can be single estimates such as high, medium and low
Probability and Impact
32
Alternatively, they can be a probability distribution that model multiple costs and associated probabilities for each risk
Probability and Impact
33
Planning a treatment for each risk such as acceptance, mitigation, transfer, sharing or avoidance
Risk Treatment
34
Risks that are both low impact and low probability typically aren't treated
Risk Treatment
35
Assess residual risk including secondary risks that result from risk mitigation, transfer or sharing
Residual Risk
36
Implement identified controls for risk mitigation, sharing, avoidance and transfer
Risk Control
37
Continuously identify new risks as things progress, monitor implementation of controls and communicate risk to stakeholders
Monitor and Review
38
used when the team wants to ensure that the risk opportunity is realized and any uncertainty is removed
Risk Exploitation
39
used to increase the probability or impact of a positive risk occurring. The strategy requires identifying and maximizing the key drivers
Risk enhancement
40
involves allocating some or all of the ownership of the risk and opportunity to a 3rdparty who has the best chance of meeting the objective.
Sharing a positive risk
41
means you intend to take advantage of the opportunity if it becomes available, but not actively pursuing it
Accepting a positive risk
42
a strategy where the project team takes action to remove the threat of the risk or protect from the impact
Risk Avoidance
43
involves shifting or transferring the risk threat and impact to a 3rdparty. This does not eliminate the risk, rather transfers the responsibility and ownership.
Risk Transference
44
the strategy whereby the project team takes action to reduce the probability of the risk occurring. This does not remove the risk or the potential impact, but rather reduces the likelihood of it becoming real
Risk Mitigation
45
means the team acknowledges the risk and its potential impact, but decides not to take any preemptive action to prevent it. It is dealt with only if it occurs.
Risk Acceptance
46
A project management activity that involves identifying, assessing, measuring, documenting, communicating, avoiding, mitigating, transferring, accepting, controlling and managing risk
Project Risk Management
47
The process of identifying risks is intuitive for experienced project managers
Project Risk Managment