Risk Assessments Flashcards

(36 cards)

1
Q

Risk Assessments

A

A process used inside of risk management to identify how much risk exists in a given network or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk

A

The probability that a threat will be realized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vulnerabilities

A

Weaknesses in the design or implementation of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat

A

§ Any condition that could cause harm, loss, damage, or compromise to our information technology systems
§ Threats are external and beyond your control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk Avoidance

A

A strategy that requires stopping the activity that has risk or
choosing a less risky alternative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk Transfer

A

A strategy that passes the risk to a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Mitigation

A

A strategy that seeks to minimize the risk to an acceptable level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Acceptance

A

A strategy that seeks to accept the current level of risk and the costs associated with it if the risk were realized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Residual Risk

A

The risk remaining after trying to avoid, transfer, or mitigate the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Qualitative Risk Analysis

A

o Qualitative analysis uses intuition, experience, and other methods to assign a relative value to risk
o Experience is critical in qualitative analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Quantitative Risk

A

o Quantitative analysis uses numerical and monetary values to calculate risk
o Quantitative analysis can calculate a direct cost for each risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Single Loss Expectancy (SLE)

A

Cost associated with the realization of each individualized threat that occurs

Asset Value x Exposure Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Annualized Rate of Occurrence (ARO)

A

Number of times per year that a threat is realized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Annualized Loss Expectancy (ALE)

A

Expected cost of a realized threat over a given year
ALE = SLE x ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Assessments

A

§ Verify that the organization’s security posture is designed and configured properly to help thwart different types of attacks
§ Assessments might be required by contracts, regulations, or laws
§ Assessments may be active or passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Active Security Assessments

A

Utilize more intrusive techniques like scanning, hands-on testing, and probing of the network to determine vulnerabilities

17
Q

Passive Assessments

A

o Utilize open source information, the passive collection and analysis of the network data, and other unobtrusive methods without making direct contact with the targeted systems
o Passive techniques are limited in the amount of detail they find

18
Q

Security controls are categorized as

A

Physical Controls
Technical Controls
Administrative Controls

19
Q

Physical Controls

A

Any security measures that are designed to deter or prevent unauthorized access to sensitive information or the systems that contain it

20
Q

Technical Controls

A

Safeguards and countermeasures used to avoid, detect, counteract, or minimize security risks to our systems and information

21
Q

Administrative Controls

A

Focused on changing the behavior of people instead of removing the actual risk involved

22
Q

NIST Security Controls Categories

A

Management Controls
Operational Controls
Technical Controls

23
Q

Management Controls (NIST)

A

Security controls that are focused on decision-making and the management of risk

24
Q

Operational Controls (NIST)

A

Focused on the things done by people

25
Technical Controls (NIST)
Logical controls that are put into a system to help secure it
26
Preventative Controls
Security controls that are installed before an event happens and are designed to prevent something from occurring
27
Detective Controls
Used during the event to find out whether something bad might be happening
28
Corrective Controls
Used after an event occurs
29
Compensating Control
§ Used whenever you can’t meet the requirement for a normal control § Residual risk not covered by a compensating control is an accepted risk
30
Types of Risks
External Risk Internal Risk Legacy Systems Multiparty IP Theft Software Compliance/Licensing
31
External Risk
Risks that are produced by a non-human source and are beyond human control
32
Internal Risk
Risks that are formed within the organization, arise during normal operations, and are often forecastable
33
Legacy Systems
An old method, technology, computer system, or application program which includes an outdated computer system still in use
34
Multiparty
A risk that refers to the connection of multiple systems or organizations with each bringing their own inherent risks
35
IP Theft
Risk associated with business assets and property being stolen from an organization in which economic damage, the loss of a competitive edge, or a slowdown in business growth occurs
36
Software Compliance/Licensing
Risk associated with a company not being aware of what software or components are installed within its network