Risk identification Flashcards
what is risk identification?
process for discovering, recognizing and documenting the risk an organization faces.
what is risk appetite?
the amount of risk, on a broad level, that an entity is willing to accept in pursuit of its mission.
what is risk capacity?
the objective amount of loss an enterprise can tolerate without its continued existence being called into question
what is risk tolerance
the acceptable level of variation that management is willing to allow for any particular risk as the enterprise pursues its objective
who is responsible for defining and approving risk appetite and tolerance?
senior management
what is risk culture?
management’s willingness to embrace, cautiously accept or avoid risk
what are importance of risk communications?
- informed risk decisions by executive management due to an improved understanding of actual exposure and daily duties.
- greater awareness among all stakeholders of the importance and value of integrating risk management into their duties
- transparency to external stakeholders regarding both the actual levels of risk facing the organization and the risk management process in use.
what are the risk components to be communicated?
- expectations from risk management (strategy, policies, procedures, awareness, training)
- current risk management capability ( risk management process maturity)
- status (risk profile, key risk indictors, loss data etc)
what are the elements of risk?
- consequences associated with specific assets
- a treat to those assets, requiring both intent (motivation) and capability.
- vulnerability specific to the threat
what is an asset?
something of either tangible or intangible value that is worth protecting, including people, information, infrastructure, finances and reputation
what are common methods of destroying data?
overwriting, degaussing, and physical destruction of the equipment.
why should sensitive and critical data be protected?
sensitive data must be protected from disclosure and modification
critical data must be protected from destruction or loss
what is an NDA
A non-disclosure agreement is a legally binding contract that establishes a confidential relationship. The party or parties signing the agreement agree that sensitive information they may obtain will not be made available to any others. An NDA may also be referred to as a confidentiality agreement
what is a statement of work?
A Statement of Work (SOW) is a document within a contract that describes the work requirements for a specific project along with its performance and design expectations. The main purpose of the SOW is to define the liabilities, responsibilities and work agreements between two parties, usually clients and service providers.
what is the importance of asset valuation?
effort should be made to determine the importance of assets in the context of organizational activities so that priority may be given to protecting the most important assets first and addressing less significant assets as time and budget allow.
effective valuation also protects the organization from paying more in protection than the net worth of the assets.
what is one technique in calculating asset value?
base it on the impact of a loss of confidentiality, integrity and availability
define asset value
what the organization or another party would pay to take possession of an asset or deny access to it by others.
what is a threat
anything (e.g. object, substance, human) that is capable of acting against an asset in a manner that can result in harm
what is a threat agent?
methods of things used to exploit vulnerability, such as determination, capability, motive and resource
what is a threat vector?
the path or route used by the adversary to gain access to the target
what is a treat analysis?
an evaluation of the type, scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against enterprise assets.
what are the dimensions of threats?
- external or internal
- intentional or unintentional
what are indicators of emerging threats?
unusual activity on a system, repeated alarms, slow system or network performance, or new or excessive activity in logs.
what is a vulnerability?
weakness in the design, implementation, operation or internal control of a process that could expose the system to adverse threats from threat events