Section 5.4 Risk Management Processes & Concepts Flashcards

(72 cards)

1
Q

What is the act of identifying, assessing and reducing the risk of issues that can impact your organizations operations and assets?

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What kind of risk comes from elements within the organization’s control?

A

Internal Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What kind of risk is usually the type of risk that the organization has limited control over?

A

External Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The cost of reducing a risk is mitigated by what?

A

The potential cost of dealing with a security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ultimately, __________ is a cost/benefit analysis of your security infrastructure.

A

Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

________ involves identifying both types of assets and determining asset value?

A

Asset Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asset value should consider?

A

Repair/Replace Costs
Deprecation,
Revenue Generated
Value to competition
Exposure factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What identifies the critical risks that pose a security threat?

A

Risk analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What kind of risk analysis is a numerical calculation of the exact cost of the loss of a specific company asset because of disaster?

A

Quantative risk analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What kind of risk analysis considers tangible and intangible factors in determining costs?

A

Qualitative risk analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The consolidation of many different types of services on the same hardware creates a security risk known as?

A

Single Point of Failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What allows a computer to host multiple instances of an operating system environment, all running from the same computer on the same hardware?

A

Use of Virtualization Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do you call the current awareness of the risk associated with an organization, both internal and external?

A

Risk awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do you call the amount of risk that is acceptable to an organization?

A

Risk Tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do you call the level of risk that an organization is willing to take before actions are taken to reduce the risk?

A

Risk Appetite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do you call the untreated risk, or the level of risk before any controls have been put into place to mitigate or counter risk?

A

Inherent risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What do you call the risk that occurs when internal controls either fail to reduce risk or misstate the amount of risk that is present or being mitigated?

A

Control risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What do you call the level of risk that remains after controls are put into place to mitigate or reduce risk?

A

Residual Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What depicts the rating of various risks according to the likelihood of occurrence and potential impact?

A

Risk Matrix Format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What will dictate how much funds need to be budgeted for risk countermeasures and mitigation?

A

Likelihood and Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The funds that are budgeted for risk countermeasures and mitigation?

A

Annualized Loss Expectancy (ALE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The annualized loss expectancy (ALE) is calculated by multiplying?

A

Annualized Rate of Occurrence (ARO) x Single Loss Expectancy (SLE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What concept prevents sensitive and private data from being intercepted or read by unauthorize users?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Ensuring confidentiality for risk control often entails including:

A

Encryption and Access Control Measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What concept ensures that your data is consistent and never modified by unauthorized persons or manipulated in any intentional or accidental manner?
Integrity
26
What concept ensures information can be trusted from the supposed sender?
Nonrepudiation
27
Data integrity includes the use of what for protecting data against manipulation?
Proper authentication Authorization Security Techniques
28
Data integrity includes the use of what for protecting data from corruption?
Redundancy Planning Fault Tolerant Systems
29
What are the common risk control methods of ensuring integrity?
Hashing Digital Signatures Certificates
30
What concept ensures that your systems and networks are always operation and providing service to users?
Availability
31
When considering risk control, what ensures availability?
Implementation of Hot\Warm\Cold sites Site Sharing Agreements
32
What concept ensures that personnel will be safe and then that organizational priorities will be carried out?
Safety
33
The cost of risk management solutions should not exceed the value of?
The asset if it is lost
34
What do you call a living document use to track different types of data elements, most commonly risk factors and risk scenarios?
Risk Register
35
What risk management strategy opts to avoid the risk all together?
Risk avoidance
36
What risk management strategy transfers, or "passes on" the risk to a 3rd party?
Risk Transference
37
What risk management strategy decides to just deal with the risk?
Risk Acceptance
38
What risk management strategy decides to use countermeasures?
Risk Mitigation
39
What types of disasters occur based on location?
Environmental
40
Environmental disasters are protected against by?
Data Backups Offsite Locations
41
What types of disasters can be accidental or intentional?
Person-made
42
Person-made disasters are protected against by?
Access Controls Physical Security
43
What kind of disasters happen to a company that is permanently connected to the internet and can come from inside and outside of the network?
Network and Hacking Attacks
44
What kind of disasters are caused by special programs able to replicate themselves?
Virus attacks
45
Protection against virus attacks include:
Antivirus Software User Education
46
What are extremely important in preventing downtime for your organization in the event of equipment or communications failure?
Disaster Recovery Operations Planning
47
What do you call a step by step plan to recover your networks and systems in the event of a disaster?
Disaster Recovery Plan
48
Who are responsible for creating and executing business continuity activities and a disaster recovery plan that outlines the goals for restoring company operations and functionality as quickly as possible following a disaster?
Disaster Recovery Team
49
What assessment looks for single points of failures and looks to replace them with redundant or fault tolerant systems?
Site Risk Assessments
50
What analysis outlines your organizations most critical functions and how they'll be affected during a disaster?
Business Impact Analysis (BIA)
51
What do you call the most important functions to complete?
Mission Essential Functions (MEF)
52
Critical business functions and their associated systems must be prioritized so that in case of a disaster, they'll be what?
They will be made operation before other less critical functions and systems
53
Most important in the BIA will be examining?
Total Financial loss incurred through certain types of disasters
54
What analysis's purpose is to determine if a system is using privacy information or connecting to one that is?
Privacy Threshold analysis
55
The most important part of an organization to get operational in the event of a disaster is what?
Communications
56
Inside of DRP documentation, what includes a list of people and businesses to notify in case of a disaster?
Notification List
57
Inside of DRP documentation, what includes phone numbers and contact information for employees, vendors, data recovery agencies, and offsite facilities?
Contact information
58
Inside of DRP documentation, what included blueprints and diagrams of all networking and facilities infrastructure so they can be re-created at the new site?
Networking and facility diagrams
59
Inside of DRP documentation, what includes configuration information for all servers, applications, and networking equipment?
System configurations
60
Inside of DRP documentation, what includes step-by-step information on how to restore data from the backup media?
Backup restoration procedures
61
Inside of DRP documentation, what includes the operating system software, appropriate license keys, and backup media?
Location of Backup and licensing media
62
To complete your disaster recovery plan, you should do what to ensure that all parts of the plan work as they should?
Test it
63
What is it called when departments sit together and go through scenarios?
Tabletop excercises
64
What do you all a report that allows you to give an honest assessment of the testing, detail the areas that should be improved upon, and identify the path forward for filling any gaps?
After Action Report(AAR) or Lessons learned report
65
High availability systems want to provide what?
Uninterrupted service consistently
66
What term specifies in measurable terms the level of service to be received, such as the percentage of time services are available?
Service Level
67
What industry-standard term refers to the average length of time from the moment a component fails until it is repaired?
Mean Time to Repair (MTTR)
68
What industry-standard term refers to the length of time that a component is expected to last in regular service?
Mean Time to Failure (MTTF)
69
What industry-standard term refers to the average length of time a specific component is expected to work until it fails?
Mean Time between Failures (MTBF)
70
What industry-standard term refers to the maximum amount of time that is considered tolerable for a service or certain business function to be unavailable?
Recovery Time Objective (RTO)
71
What industry-standard term refers to the maximum acceptable amount of lost data due to an outage or disaster?
Recovery Point Objective (RPO)
72
What is a strategy to deflect threats in order to avoid the costly and disruptive consequences of a damaging event?
Risk avoidance