Chapter 5 MC
The calculation of the likelihood of an attack coupled with the attack frequency to determine the expected number of losses within a specified time range is called the __________.
loss frequency
Management of classified data includes its storage and _________.
portability, distribution, and destruction
The first phase of risk management is _________.
risk identification
A _________ assigns a status level to employees to designate the maximum level of classified data they may access.
security clearance scheme
When organizations adopt security measures for a legal defense, they may need to show that they have done what any prudent organization would do in similar circumstances. This is referred to as __________.
standards of due care
The __________ control strategy attempts to shift risk to other assets, other processes, or other organizations.
transference
In a __________, assets or threats can be prioritized by identifying criteria with differing levels of importance, assigning a score for each of the criteria, and then summing and ranking those scores.
weighted factor analysis
__________ is simply how often you expect a specific type of attack to occur.
Annual Rate of Occurrence (ARO)
The formal decision-making process used when considering the economic feasibility of implementing information security controls and safeguards is called a __________.
CBA
__________ plans usually include all preparations for the recovery process, strategies to limit losses during the disaster, and detailed steps to follow when the smoke clears, the dust settles, or the flood waters recede.
DR
A best practice proposed for a small to medium-sized business will be similar to one used to help design control strategies for a large multinational company.
False
Cost-benefit analyses (CBAs) cannot be calculated after controls have been functioning for a time, as observation over time prevents precision in evaluating the benefits of the safeguard and determining whether it is functioning as intended.
False
Identifying human resources, documentation, and data information assets of an organization is less difficult than identifying hardware and software assets.
False
Risk control is the enumeration and documentation of risks to an organization's information assets.
False
Risk mitigation is the process of assigning a risk rating or score to each information asset.
False
You cannot use qualitative measures to rank information asset values.
False
The __________ plan specifies the actions an organization can and should take while an adverse event is in progress. An adverse event could result in loss of an information asset or assets, but it does not currently threaten the viability of the entire organization.
IR
__________ feasibility analysis examines user acceptance and support, management acceptance and support, and the overall requirements of the organization's stakeholders.
Operational
A qualitative assessment is based on characteristics that do not use numerical measures.
True
Exposure factor is the expected percentage of loss that would occur from a particular attack.
True
If the acceptance strategy is used to handle every vulnerability in the organization, its managers may be unable to conduct proactive security activities and may portray an apathetic approach to security in general.
True
Risk control is the application of controls that reduce the risks to an organization's information assets to an acceptable level.
True
Security efforts that seek to provide a superior level of performance in the protection of information are referred to as best business practices.
True
Some information security experts argue that it is virtually impossible to determine the true value of information and information-bearing assets.
True
Sometimes a risk assessment report is prepared for a specific IT project at the request of the project manager, either because it is required by organizational policy or because it is good project management practice.
True
The mitigation control strategy attempts to reduce the impact of a successful attack through planning and preparation.
True
The most common example of a mitigation procedure is a contingency plan
True
The value of information to the organization's competition should influence the asset's valuation.
True
To determine if the risk to an information asset is acceptable or not, you estimate the expected loss the organization will incur if the risk is exploited.
True
When determining the relative importance of each asset, refer to the organization's mission statement or statement of objectives to determine which elements are essential, which are supportive, and which are merely adjuncts.
True
When it is necessary to calculate, estimate, or derive values for information assets, you might give consideration to the value incurred from the cost of protecting the information.
True
You should adopt naming standards that do not convey information to potential system attackers.
True
The threats-vulnerabilities-assets (TVA) worksheet is a document that shows a comparative ranking of prioritized assets against prioritized threats, with an indication of any vulnerabilities in the asset/threat pairings.
True
The __________ strategy is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation.
acceptance
Risk _________ defines the quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility.
appetite
Risk _________ is the application of security mechanisms to reduce the risks to an organization's data and information systems.
control
A _________ is a formal access control methodology used to assign a level of confidentiality to an information asset and thus restrict the number of people who can access it.
data classification scheme
The _________ control strategy attempts to eliminate or reduce any remaining uncontrolled risk through the application of additional controls and safeguards.
defense
Some people search trash and recycling bins-a practice known as _________-to retrieve information that could embarrass a company or compromise information security.
dumpster diving
__________ is an asset valuation approach that uses categorical or non-numeric values rather than absolute numerical measures.
Qualitative assessment
_________ equals the probability of a successful attack multiplied by the expected loss from a successful attack plus an element of uncertainty.
Risk