Risk Management Flashcards

(48 cards)

1
Q

Risk assessment frequency

A

The regularity where risk assessments are performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Frequency Ad Hoc

A

Conducting when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Frequency recurring

A

Conducting at regular intervals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Frequency one-time

A

Conducting for a specific purpose and not repeated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Frequency continuous

A

Continuous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk Identification

A

Recognizing potential risks that can negatively impact an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Business Impact Analysis

A

Process of evaluating the potential effects of disruption to the functions and processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Recovery Time Objective

A

The maximum length of time that can elapse before the shutdown affects you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Recovery Point Objective

A

The maximum acceptable amount of data loss measured in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mean Time to Repair (MTTR)

A

The average time required to repair a failed component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mean Time Between Failures

A

The average time between failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk Register

A

Document detailing identified risks including description, impact, likelihood, and mitigation strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk Register Description

A

The what of the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Register Impact

A

The consequence of the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk Register Likelihood\Probability

A

The chance of the risk happening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk Register Outcome

A

The result of the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk Register Level\Threshold

A

Combining the Impact and Likelihood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Risk Register Cost

A

The Financial Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Risk Register Tolerance\Acceptance

A

How much the organization is willing to deal with uncertainty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Risk Register Appetite

A

the amount and type of risk an organization is willing to take

21
Q

Key Risk Indicator (KRIs)

A

Predictive measurements to signal rising risk levels

22
Q

Risk Owner

A

The person or group responsible for managing the risk

23
Q

Qualitative Risk Analysis

A

Subjective and high-level view of risks; method of accessing risk based on their impact and the likelihood of occurrence

24
Q

Quantitative Risk Analysis

A

Objective and numerical view of risks

25
Risk Management Transference
Transferring the risk to another
26
Risk Management Acceptance
Recognizing and embracing the risk
27
Risk Management Avoidance
Take actions to steer clear of risks
28
Risk Management Mitigation
Taking steps to reduce the impact or likelihood
29
Residual risk
Likelihood and impact after implementing strategies
30
Third party vendor risk
Security and operation challenges introduced by external entities
31
Managed service providers
Provides a range of technology services and support to business as clients; example Microsoft Office
32
Supply Chain Attack
Targeting a weaker link to gain access to the primary target
33
CHIPS Act
U.S. federal statute that provides roughly $280 billion in new funding to boost research and manufacturing of semiconductors in USA
34
Vendor assessment
Process that organizations used to evaluate the security, reliability, and performance of external entities
35
Penetration testing
Simulated cyberattack against a supplier system to check for vulnerabilities
36
Internal audit
Vendor's self-assessment where they evaluate their own practices against industry standards
37
Independent assessment
Evaluation conducted by third-party entities that leave no stake in the circle
38
Vendor questionnaire
Documents that potential vendors fill out
39
Rules of engagement
Guidelines that dictate the terms or interaction between vendor and organization
40
Feedback loops
Is a two-way communication between vendor and organization
41
Basic contracts
Establish the relationship of two parties service
42
Service-level Agreement (SLA)
Standard of service a client can expect from a provider
43
Memorandum of Agreement (MOA)
Formal and outlines the specific responsibilities of the roles of the involved
44
Memorandum of Understanding (MOU)
Less binding and more of a declaration of intent
45
Master-service Agreement (MSA)
Blanket agreement that covers the general terms of engagement between parties across multiple transactions
46
Statement of work
Use the specified details for particular projects
47
NDA
Its a nda
48
Business Partnership Agreement
Two entities decide to pool the resources