MIS4800 Chapters 20 & 21
Threat
Any circumstance or event with the potential to cause harm to an asset is a(n) ___________.
Single Loss expectancy (SLE)
Asset value x exposure factor = _____________.
Mitigate
If you reduce the likelihood of a threat occurring, you ____________ a risk.
Configuration status accounting.
Procedures for tracking and maintaining data relative to eacah configuration item in the baseline are called.
Risk assessment
Risk analysis is synonymous with __________.
Annualized loss expectancy (ALE)
Single loss expectancy x annualized rate of occurrence = _____________.
Configuration auditing
The process of verifying that configuration items are built and maintained according to requirements, standards, or contractual agreements is called _________.
Impact
When a threat exploits a vulnerability, you experience a(n) _________.
Configuration identification
When you identify which assets need to be managed and controlled, you are performing _______.
Change management
________ is a standard methodology for performing and recording changes during software development and operation.
Separation of duties
___________ is the process of assigning responsibilities to different individuals such that no single individual can commit fraudulent or malicious actions.
Configuration control
___________ is the process of controlling changes to items that have been baselined.
Clustering
____________ is a circumstance that increases the likelihood or probable severity of a loss.
Baseline
A ___________ describes a system as it is built and functioning at a point in time.
Vulnerability
A characteristic of an asset that can be exploited by a threat to cause harm is its_________.
Countermeasure and safeguard
A control may also be called a(n)________.
Capability Maturity Model Integration (CMMI)
A structured methodology that provides an evolutionary path from ad hoc processes to disciplined software management is the ___________.
Exposure factor
The _______ measures the magnitude of the loss of an asset.
Change control board (CCB)
The ___________ is the body that provides oversight to the change management process.
System problem report (SPR)
The document used by the change control board to track changes to software is called _________.
