Módulo 12 - Risk Management Processes Flashcards
(115 cards)
What is the primary goal of risk management?
To identify, assess, and mitigate vulnerabilities and threats to mission essential functions while minimizing risk and disruption.
What are the five phases of risk management?
- Identify mission essential functions
- Identify vulnerabilities
- Identify threats
- Analyze business impacts
- Identify risk responses.
What is Maximum Tolerable Downtime (MTD)?
The longest period a business function can be offline without causing irrecoverable failure.
What is the formula for Recovery Time Objective (RTO) and Work Recovery Time (WRT)?
RTO + WRT must not exceed MTD.
What is Recovery Point Objective (RPO)?
The maximum acceptable amount of data loss, measured in time, that a system can tolerate.
What is Mean Time Between Failures (MTBF)?
The average operational time between system or equipment failures.
What is Mean Time to Repair (MTTR)?
The average time required to repair and restore a system to full operation.
What are the four risk response strategies?
- Mitigate
- Avoid
- Transfer
- Accept.
What is risk transference?
Assigning risk to a third party, such as an insurance provider.
What is risk acceptance?
Choosing not to implement countermeasures because the risk level is deemed acceptable.
What is the difference between a risk exception and a risk exemption?
A risk exception is temporary and must be reviewed periodically.
A risk exemption is a strategic decision to allow risk to remain without mitigation.
What is a Mission Essential Function (MEF)?
A function that cannot be deferred and must be performed continuously or restored first after a disruption.
What is the purpose of a Business Process Analysis (BPA)?
To identify inputs, hardware, staff, outputs, and process flow for critical systems supporting mission essential functions.
What is Business Impact Analysis (BIA)?
A process that assesses the effects of disruptions on operations and quantifies potential losses.
What are common methods for identifying risks?
- Vulnerability assessments
- Penetration testing
- Security audits
- Threat intelligence.
What is residual risk?
The remaining risk after applying mitigation, transference, or acceptance measures.
What is risk appetite?
The organization-wide level of residual risk deemed acceptable based on strategic goals and compliance.
Give an example of risk mitigation.
Implementing a sprinkler system to reduce the impact of a fire.
Provide an example of risk avoidance.
Discontinuing a high-risk software project due to its vulnerabilities.
Describe an example of risk transference.
Purchasing cybersecurity insurance to cover potential data breach liabilities.
What are the two main variables used in risk assessment?
Likelihood and impact.
How is likelihood expressed in qualitative and quantitative analysis?
Qualitative: ‘Low,’ ‘Medium,’ ‘High’ or 1-5 scale.
Quantitative: Numerical value (0-1) or percentage.
What is impact in risk assessment?
The severity of a risk event if realized, determined by asset value and cost of disruption.
What is an RCSA?
Risk and Control Self-Assessment—a process for identifying risks and evaluating control effectiveness.