ISC2 CHAPTER 1: Module 2: Understand the Risk Management Process

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Qualitative Risk Analysis

A method for risk analysis that is based on the assignment of a descriptor such as low, medium or high. Source: NISTIR 8286

Quantative Risk Analysis

A method for risk analysis where numerical values are assigned to both impact and likelihood based on statistical probabilities monetarized valuation of loss or gain. Source: NISTIR 8286.

Risk

A possible event which can have a negative impact upon the organization.

Likelihood of Occurrence

A weighted factor based on a subjective analysis of the probability that a given threat is capable of exploiting a given vulnerability or set of vulnerabilities.

Threat Actors

An individual or a group that attempts of exploit vulnerabilities to cause or force a threat to occur.

Threat

Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image or reputation), organizational assets, individuals, other organizations or the nation through an information system via unauthorized access, destruction, disclosure, modification of information and/or denial of service. Source: NIST SP 800-30 Rev 1

Asset

Anything of value that is owned by an organization. Assets include both tangible items such as information systems and physical property and intangible assets such as intellectual property.

Risk Identification

Recurring process of identifying different possible risks, characterizing them and then estimating their potential for disrupting the organization. Takeaways to remember about risk identification: 1- identify risk to communicate it clearly. 2- Employees at all levels of the organization are responsible for identifying risk. 3- Identify risk to protect against it.

Risk Acceptance

Risk acceptance is taking no action to reduce the likelihood of a risk occurring. Management may opt for conducting the business function that is associated with the risk without any further action on the part of the organization, either because the impact or likelihood of occurrence is negligible, or because the benefit is more than enough to offset that risk.

Risk Avoidance

Risk avoidance is the decision to attempt to eliminate the risk entirely. This could include ceasing operation for some or all of the activities of the organization that are exposed to a particular risk. Organization leadership may choose risk avoidance when the potential impact of a given risk is too high or if the likelihood of the risk being realized is simply too great.

Risk Mitigation

Risk mitigation is the most common type of risk management and includes taking actions to prevent or reduce the possibility of a risk event or its impact. Mitigation can involve remediation measures, or controls, such as security controls, establishing policies, procedures, and standards to minimize adverse risk. Risk cannot always be mitigated, but mitigations such as safety measures should always be in place.

Risk Transference

Risk transference is the practice of passing the risk to another party, who will accept the financial impact of the harm resulting from a risk being realized in exchange for payment. Typically, this is an insurance policy.

Artificial Intelligence

The ability of computers and robots to simulate human intelligence and behavior.

Probability

The chances, or likelihood, that a given threat is capable of exploiting a given vulnerability or a set of vulnerabilities. NIST SP 800-30 REV 1.

Risk Treatment

The determination of the best way to address an identified risk.

Risk Tolerance

The level of risk an entity is willing to assume in order to achieve a potential desired result. Source: NIST SP 800-32. Risk threshold, risk appetite and acceptable risk are also terms used synonymously with risk tolerance.

Impact

The magnitude of harm that could be caused by a threat's exercise of a vulnerability.

Threat Vector

The means by which a threat actor carries out their objectives.

Information security risk

The potential adverse impacts to an organization's operations (including its mission, functions and image and reputation), assets, individuals, other organizations, and even the nation, which results from the possibility of unauthorized access, use, disclosure, disruption, modification or destruction of information and/or information systems.-----------Reflects the potential adverse impacts that result from the possibility of unauthorized access, use, disclosure, disruption, modification or destruction of information and/or information systems. This definition represents that risk is associated with threats, impact and likelihood, and it also indicates that IT risk is a subset of business risk.

Likelihood

The probability that a potential vulnerability may be exercised within the construct of the associated threat environment.

Risk Assessment

The process of identifying and analyzing risks to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals and other organizations. The analysis performed as part of risk management which incorporates threat and vulnerability analyses and considers mitigations provided by security controls planned or in place.

Risk Management

The process of identifying, evaluating and controlling threats, including all the phases of risk context (or frame), risk assessment, risk treatment and risk monitoring.

Vulnerability

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.

vulnerability

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.

Bots

malicious code that acts like a remotely controlled "robot" for an attacker, with other Trojan and Worm capabilities.


Ensembles d'études connexes

Python Data Structures / Algorithms

View Set

Economics 101: Aggregate Expenditures part 2 ALA Assignment

View Set

CHAPTER 43: CARE OF PATIENTS WITH PROBLEMS OF THE CENTRAL NERVOUS SYSTEM: THE SPINAL CORD

View Set

ServSafe Chapter 7 (7th Edition)

View Set

Learning Curve: 11c The Social-Cognitive Perspective and Exploring the Self

View Set