• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/27

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

27 Cards in this Set

  • Front
  • Back
Define "RISK"
Possibility of harm to an asset as a result of a threat exploiting a vulnerability.

Ex. Probability of a virus entering your organization and infecting your computers causing damage.

RISK = THREAT x VULNERABILITY X IMPACT
Define an "ASSET"
Valuable resource you are trying to protect

(Ex. Data, Systems, People, Buildings, Property,...)
Define a "THREAT"
A potentially harmful occurrence

Potential danger to an asset carried out by a threat agent

Ex. earthquake, power outage, network based worm (Conficker)
Define "VULNERABILITY"
Weakness that allows a threat to cause harm.

Ex. buildings not built to withstand earthquakes, a DC without proper backup power, an old and unpatched system.
Define "IMPACT / COST (Consequences)"
Severity of the damage, sometimes expressed in dollars and therefore can appear as Cost for that reason.
Define a "SAFEGUARD"
A measure taken to reduce a risk
Define "ANNUALIZED LOSS EXPECTANCY (ALE)"
Calculation that allows you to determine the annual cost of a loss due to a risk.

(Once calculated, ALE allows you to make informed decisions to mitigate the risk.)

ALE = SLE X ARO
Define "ASSET VALUE (AV)"
Value of the IN/TANGIBLE asset you are trying to protect.
Define an "INTANGIBLE ASSET"
Value of an asset that is challenging to calculate / has no direct price tag.

Ex. Brand Loyalty
Define a "TANGIBLE ASSET"
Value of an asset that are straightforward to calculate.

Ex. Computers, Buildings
Define "EXPOSURE FACTOR (EF)"
percentage (%) of value an asset has lost due to an incident.

Ex. loss of an unecrypted laptop = 100% EF
Define "SINGLE LOSS EXPECTANCY (SLE)"
Cost of a single Loss.

SLE = AV X EF

, where AV=Asset Value and EF=Exposure Factor
Define "ANNUAL RATE OF OCCURENCE (ARO)"
Number of losses you suffer per year

Ex. lost 11 laptops per year on average, ARO=11
Define "TOTAL COST OF OWNERSHIP (TCO)"
Cost of a mitigating safeguard.

It combines upfront costs (often a one-time capital expense) plus annual cost of maintenance, including staff hours, vendor maintenance fees, software subscriptions, etc..
Define "RETURN ON INVESTMENT (ROI)"
Amount of money saved by implementing a safeguard.

If your TCO is less than your ALE (TCO <ALE), you have a Positive ROI (and have made a good choice)
If your TCO is higher than your ALE (TCO>ALE), you have a negative ROI (and made a poor choice)
LIST THE TYPES OF RISK ANALYSIS
- QUALITATIVE
- QUANTITATIVE
- HYBRID
Define "QUALITATIVE RISK ANALYSIS"
Uses simple and approximate values and is inherently subjective.

Ex. Risk Analysis Matrix
Define "QUANTITATIVE RISK ANALYSIS"
Uses hard metrics (dollars, hours,...) and is more objective than Qualitative Risk Analysis.

You are required to CALCULATE the quantity of the asset you are protecting.
Define "HYBRID RISK ANALYSIS"
Combines Qualitative and Quantitative Risk Analysis.

Uses Quantitative analysis for risks that may easily be expressed in hard numbers (dollars), and the Qualitative for the remaining risks.
Define "RISK METRICS"
Metrics that can greatly assist the Information Security budgeting process.

They help illustrate potentially costly risks and demonstrate the effectiveness (and potential cost savings) of existing controls.
WHAT CHOICES DO WE HAVE WHEN CONFRONTING RISK?
After a Risk has been assessed, we can choose to:

1) ACCEPT THE RISK
2) MITIGATE THE RISK
3) TRANSFER THE RISK
4) AVOID THE RISK
Define "ACCEPTING RISK"
After a thorough Risk Analysis where all options were considered, it is determined that it is cheaper to leave an asset unprotected relative to a specific risk, rather than spend the effort and money required to protect it.
What are the typical criteria for ACCEPTING A RISK
LOW LIKELIHOOD/CONSEQUENCE risks are the typical candidates for Risk Acceptance.

Some risks (such as data protected by law, or life/safety of employees) however are examples where risk acceptance in NOT an option.
Define "MITIGATING A RISK"
Lowering a Risk to an acceptable level.

Ex. Loss of Laptops with PII, Mitigating the risk could be to encrypt the laptops.
Define "TRANSFER THE RISK"
AKA ,Insurance Model. You pay an Insurance Company to assume the Risk for you.

Ex. Fire Insurance
Define "AVOID THE RISK"
After a thorough Risk Analysis it is determined that there are HIGH or EXTREME Risks that cannot be easily mitigated, and that avoiding the risk is the best option.

If ALE > ROI (despite risk mitigation) then AVOID

Legal or Regulatory enforcement may also prevent you from chosing anything other than Avoiding risk.
List the 9 steps in NIST's RISK MANAGMENT PROCESS entitled "Managment Guide for IT Systems"
1. SYSTEM CHARACTERIZATION
2. THREAT IDENTIFICATION
3. VULNERABILITY IDENTIFICATION
4. CONTROL ANALYSIS
5. LIKELIHOOD DETERMINATION
6. IMPACT ANALYSIS
7. RISK DETERMINATION
8. CONTROL RECOMMENDATIONS
9. RESULTS DOCUMENTATION