Intl Risk

Ace your homework & exams now with Quizwiz!

According to the World Economic Forum's Global Risk Report 2020 what are the most frequent and severe types of risks facing the world?

extreme weather and climate action failure

The primary difference between a cyber virus and a cyber worm used as malware is that worm must be triggered by the activation of their host; whereas virus are stand-alone malicious programs that can self-replicate and propagate independently as soon as they have breached the system

false

while a ______ deductible pays out the full amount once the amount of loss equals or exceeds the deductible.

franchise

_____ risk that events or actions in one country (or region) could influence political or social policy or events in another country or region.

geopolitical risk

How Do Cyber Attacks Occur?

malware, Denial of Service (DOS), logic bomb

Situation in which an employer is held liable for an injury caused by an employee using his or her own property when acting on the employer's behalf.

nonownership liability

contractual liability (civil liability)

occurs when the terms of a contract are not carried out as promised by either party to the contract.

insurance

often exclude coverage for nuclear, flood, earth, terrorist act

common law

on the other hand, is based on custom and court decisions.

is a contractual provision that transfers financial responsibility for liability from one party to another.

hold-harmless agreemen

website hijacking

involves unautho-rized changing of a website's registration or otherwise taking over a domain name or website todeceive users.

These types of risks are similar to political risks, in that they often result from political changes, but these risks also exist independently.

legal risk

Trojan

malicious software disguised to look legit

Torts (civil liability)

All civil wrongs that do not involve a breach of contract are considered

All of the following are reason or the apparent increase in the number and size of natural catastrophes over time EXCEPT

Governmental record-keeping and media coverage is improving over time so assessment of losses is more accurate now than in the past

zombies

Infected computers in abotnet.

malware

Malicious software programs designed to disrupt or harm a computer, network, smartphone, or other device.

In the cyber insurance coverage for Privacy Liability there is no requirement of negligence on the part of the insured to trigger coverage, and it provides coverage for the intentional acts of insured's employees

True

While the source of liability may be intentional or unintentional, more often it is unintentional, which involves

negligence

is the body of written law created by legislative bodies.

statutory law

botnet

A network ofbot-compromisedcomputers used to carryout malicious cyberattacks.

To prove the occurrence of negligence four elements must be present. Which of the following is not required to determine negligence?

Awareness of the duty to act (or not to act) in some way.

All of the following statements about catastrophic risk are true EXCEPT

Catastrophic risk exposure can be avoided by adequate planning

logic bomb

Code that is intentionally inserted into a software system that will set off a malicious function when triggered by specific action.

firewall

Device that protects anetwork from intrusion bypreventing access unlesscertain criteria are met.

Severe Inflation

Economic Risk

A benefit of purchasing cyber insurance is it that the purchasing organizations will not incur the costs of loss of making corrective measures

False

Most cyber breaches are discovered within a month of the event having happened

False

is the risk that events or actions in one country (or region) could influence political or social policy or events in another country or region.

Geopolitical risk

In the lecture on managing catastrophic risk, all of the following were delineated as factors impacting the susceptibility of a structure and environment to damage EXCEPT

Insurance coverage for the damaging peril

Two examples of political risk management are:

Investing in infrastructure in host countries and cultivate a strong track record of being a good corporate citizen and explore public political risk insurance coverage through Seek multiyear policies or coverage for as short a time frame as possible and keep tightlipped about the existence of any political risk coverage you obtain

This doctrine allows a plaintiff to sue any of several defendants individually for the full harm incurred, meaning one party only slightly-at-fault could be held primarily responsible for the entire loss.

Joint and several liability doctrine

Legal Liability

Legal liability is based on societal rules which reflect social and cultural norms. Liability exposure may arise out of either statutory or common law, Legal liability is the responsibility to right some wrong done to another person or organization. Legal liability is based in law.

What are some different ways employee actions can result in cyber property loss?

Malware is often spread by employees who click on email links or open attachments, Circumventing security features can also leave corporate network vulnerable to attack, Employees connecting their own devices to the network

virtual private network (VPN)

Network that connectssatellite offices with acentral location and allowsremote users to gainsecure access to acorporate network.

Liability arising from the ownership, maintenance, and use of premises and conduct of activity.

Operations Liability

Physical property that is mobile (not permanently attached to something else).

Personal Property

Consists of real or personal property.

Physical Property

Democratic Election

Political Risk

Military Coup

Political Risk and Conflict Risk

Terrorism

Political and Conflict Risk

This doctrine shifts the burden of proof from the plaintiff to the defendant.

Res ipsa loquitur

_____ is the name for the method in which analysts generate simulation "what if" games that are used by management to consider and develop plans to deal with alternative futures

Scenario Planning

Worm or Virus

The primary difference between a cyber virus and a cyber worm used as malware is that viruses must be triggered by the activation of their host; whereas worms are stand-alone malicious programs that can self-replicate and propagate independently as soon as they have breached the system.

The top 10 external cyber vulnerabilities accounted for nearly 52% of all identified external vulnerabilities. The thousands of vulnerabilities account for the other 48%

True

keylogging

covert recording of every keystroke entered... steal user names and passwords

is concerned with acts that are contrary to public policy.

criminal law

_______ deductible shrinks as the amount of loss increases

disappearing

Denial of Service (DOS)

disrupt traffic but flooding with traffic or overloading... botnets or zombies

In risk management, the distinction between real and personal property is relevant because:

dissimilar properties are exposed to perils with different likelihoods

Which of the following best describes global risks

interconnected

Which of the following words best describes global risks.

interconnected

The owner or tenant of premises, for example, does not owe the same duty to each person who enters the property. The highest degree of care is owed to:

invitees

killware

next big cyber threat... actually end lives... purely for harm (damage water supply)

Retention

recommended when insurance unavailable, unaffordable... property owners have the capability of financing losses internally.... often used with other risk finance options.....

a ______ provides compensation for a person who has been harmed in some way.

remedy

This doctrine shifts the burden of proof from the plaintiff to the defendant.

resa ipsa loquitur

Compensation for harms that generally are easily quantifiable into dollar measures. Also known as "economic damages".

special damages

With a ___ deductible, the policyholder pays for all losses less than a specified amount

straight

All civil wrongs that do not involve a breach of contract are considered

torts

is a person who enters the premises of another without either express or implied permission from a person with the right to give such permission.

trespasser

Two thirds of employers monitor internet connections of their employees

True

Each of the following is considered in the book chapter and lecture notes as a man-made catastrophic risk EXCEPT

Tsunamis caused by undersea oil exploration using dynamite and sonar to locate reserves

Cyber risk can be very well controlled by having strong passwords, firewalls and constant monitoring of the computer system for signs of a breach

False

Premium payments for nonadmitted coverage are tax deductible, even in countries where nonadmitted coverage is permitted

False

Social Media (Facebook, YouTube, Twitter, WhatsApp, Messenger, WeChat, Instagram, Pinterest, Reddit, LinkedIn, SnapChat, Tik Toc, etc.) used by employees is a risk for employing organizations only if it is done while on the job

False

Most failures in cyber security are caused by external people, or by disgruntled or dishonest employees

True

Compensation for harms that are not specifically quantifiable but that require compensation all the same. Also known as "noneconomic damages."

general damages

Even if the business' network is breached, they are covered under their general liability policy or their crime policy

False

Select all of the following statements that accurately describe deductibles.

A deductible requires the insured to bear some portion of loss before the insurer is obligated to make a payment. Deductibles help maintain reasonable premiums because they eliminate administrative expenses of the low-value, common losses.

virus

A program or code thatreplicates itself inside acomputer or network withthe intent to damage,destroy, or hijack anoperating system orcontrol program.

worm

Similar to a virus, except that it is a program rather than a code segment hidden in a host program. A worm also copies itself automatically and actively transmits itself directly to other systems.... don't need a person to take action

If you dam a creek on your property to build a lake, you will be liable in most situations for injury or damage caused if the dam collapses and floods the area below. This is an example of:

Strict liability

Statutory Law

is the body of written law created by legislative bodies.

Select all of the following statements which accurately describe global risks:

- Global risks include all the political, economic, cultural, technological, and environmental risks which exist outside the influence of any single country's government. - Global risks are all the external, uncontrollable risks which could damage a company financially. - Global risks can affect a business whether they operate internationally or not. - Global risks are risks that cross borders and have the potential to affect everyone.

Select all of the following statements which accurately describe global risks:

-Global risks can affect a business whether they operate internationally or not. -Global risks are all the external, uncontrollable risks which could damage a company financially. -Global risks include all the political, economic, cultural, technological, and environmental risks which exist outside the influence of any single country's government. -Global risks are risks that cross borders and have the potential to affect everyone.

Three things to know about ransomware

1.Ransomware Attackers Are Evolving, From Whom They Target to How 2. Key Ransomware Exposures Every Business Must Prepare For Cyber insurance-legal risks, cryptocurrency, reputational risk, business interruption coverage 3. Steps Risk Professionals Need to Take to Combat Ransomware The importance of education can never be overstated when it comes to ransomware

Identify this type of insurance written by companies authorized to write insurance in the country where a risk exposure is located

Admitted insurance

All of the following are true regarding a CAT (or Catastrophe) Bond EXCEPT

Answer: CAT bonds are highly rated and are priced similar to highly rated corporate bonds The CAT bond is issued by a Special Purpose Vehicle (SPV) CAT bonds are often issued by insurers or reinsurers who have catastrophic risk exposure they would like to get rid of Investor are attracted to CAT bonds because their return on the CAT bond is uncorrelated with other economic assets in their portfolio (zero beta) CAT bonds are designed to pay higher coupons (interest) to investors if there is no catastrophe, but the investor stops getting these coupons if there is a catastrophe of a specified magnitude

All of the following are risk reduction measures the either lower the probability of flooding or storm surge damage along the coast or the severity of the consequences of flooding or storm surge along the coast EXCEPT

Answer: Financial assistance to damaged homes by FEMA or HUD.... Correct: Elevating and flood proofing structures Levees and sea walls Surge barriers along the coast Land use restrictions

Which of the following statements about global political risk management is incorrect?

Answer: Insurance is the only way firms can protect themselves against loss from global political risks. Private insurers in the political risk insurance market are concentrated mostly in the UK, USA and Bermuda Some types of political risk insurance are available through international government agencies. Political risk policies are not standardized Political risk coverage is available against a variety of perils, including expropriation of property by a government and political violence

Which of the following statements about global political risk management is incorrect?

Answer: Insurance is the only way firms can protect themselves against loss from global political risks. -Private insurers in the political risk insurance market are concentrated mostly in the UK, USA and Bermuda -Political risk policies are not standardized -Political risk coverage is available against a variety of perils, including expropriation of property by a government and political violence -Some types of political risk insurance are available through international government agencies.

Insurance policies often exclude coverage for the all of the following catastrophic events EXCEPT

Answer: Large chemical plant explosions with resulting deaths, property damage and evacuations Terrorist acts with resulting deaths, property damage and economic disruption Flood damages with resulting deaths, property damage and evacuations Nuclear-related events with resulting deaths, property damage and evacuations Earthquakes with resulting deaths, property damage and evacuations

All of the following are reasons causing increases in catastrophic losses over time EXCEPT

Answer: Population increase means people have no choice but to live in hazardous areas Because of economic considerations, many businesses marshal their factors of production in close proximity to rivers and ocean ports for easier or less costly transportation Global climate change is increasing causing more extreme weather and rising sea levels People are drawn to live in pleasant locations like coastal areas and rivers because of their desirable beauty, but these locations can have greater threats of natural catastrophes

All of the following are true regarding financing catastrophic risk EXCEPT

Answer: The Federal government payment to hurricane victims damaged by flooding is based solely on the amount of damage experienced and not whether or not the individual had bought insurance from the National Flood Insurance Program of FEMA Government often steps in as a risk taker of last resort Risk financing capacity for catastrophic loss exposures remains a major concern for the insurance industry internationally Primary insurers can insure catastrophic risk if they can arrange a reinsurance program to spread the risk internationally Insurance policies often exclude coverage for many catastrophic events

The lecture notes provided 5 Simple Ways to Block Most Malware. This included all but which of the following

Answer: Use a difficult to guess password.... Correct: Prevent VBScript and JavaScript abuse, Use your firewall/email filtering to block the most commonly abused file types, Lock down Microsoft Office, Put restrictions on PowerShell

to prove the occurrence of negligence four elements must be present. Which of the following is not required to determine negligence?

Awareness of the duty to act (or not to act) in some way

cat bond

Catastrophe bonds emerged from a need by insurance companies to alleviate some of the risks they would face if a major catastrophe occurred, which would incur damages that they could not cover by the invested premiums. An insurance company issues bonds through an investment bank, which are then sold to investors. These bonds are inherently risky, generally BB,[1] and usually have maturities less than 3 years. If no catastrophe occurred, the insurance company would pay a coupon to the investors. But if a catastrophe did occur, then the principal would be forgiven and the insurance company would use this money to pay their claim-holders. Investors include hedge funds, catastrophe-oriented funds, and asset managers. They are often structured as floating-rate bonds whose principal is lost if specified trigger conditions are met. If triggered the principal is paid to the sponsor. The triggers are linked to major natural catastrophes. Catastrophe bonds are typically used by insurers as an alternative to traditional catastrophe reinsurance.

Which of the following is NOT a characteristic of terrorism, as defined in the text reading and lecture notes?

Committed against foreigners for the purpose of reclaiming or conquering land

functions of local govt.

Direction and control Communications Warning Emergency public information

Lower-level computer languages are typically used for development in handheld devices (for space, battery, and speed rationales). This will increasingly prevent the continuation of basic cyber vulnerability flaws

False

With a really good computer firewall, good password protection and frequent monitoring of external attacks so as to keep outsiders out of the organization's computer system, there is no need for partitioning the computer system to allow employees selective access to only certain parts of the system

False

Select all of the following statements that accurately describe legal liability.

Liability exposure may arise out of either statutory or common law. Legal liability is based on societal rules which reflect social and cultural norms. Legal liability is the responsibility to right some wrong done to another person or organization. Legal liability is the responsibility to right some wrong done to another person or organization. Legal liability is based in law.

what kind of risk? Terrorism

Political, Conflict

Permanent structures that if removed would alter the functioning of the property.

Real Property

cybersquatting

Seeking compensation forthe use of a registereddomain name from therightful trademark holder.

Which of the following is not considered to be a catastrophic natural hazard loss prevention activity?

Small Business Administration low interest loans through FEMA for rebuilding

Why might an American company operating in a foreign country choose to purchase non-admitted coverage?

So, they can utilize terms and conditions familiar to U.S. risk managers.

bot (internet bot orweb robot)

Software applicationsrunning automated tasks(scripts) used to performrepetitive tasks.

In common law, the courts are guided by the this doctrine, which holds that once a court decision is made in a case with a given set of facts, the courts tend to adhere to the principle thus established and apply it to future cases involving similar facts.

Stare decisis

"Denial of Service" (or Distributed Denial of Service (DDoS)) disrupts the function of a website by overloading their servers with pulses called pings so it is inaccessible

True

A logic bomb is a code that is intentionally inserted into a software system that will set off a malicious function when triggered by specific action

True

A zero day vulnerability is one that has never been recognized or exploited

True

E-mails can be traced back to the computer from which they were originally sent, so it is important to be careful in what you send

True

Global cyber crime losses are on the order of 6 trillion US dollars per year

True

It is good corporate policy to warn employees that personal e-mails sent on company machines will be treated no differently than their business messages and are subject to inspection

True

One benefit of the cyber insurance carrier providing coverage on Dollar Sublimit Basis is that the insured then knows exactly how much money they have available for a cyber event

True

One negative associated with the cyber insurance carrier providing coverage on Per Persson Sublimit Basis is that the insured can only select a response firm from a panel counsel list

True

Over 2/3 of cyber breaches took months or years to discover

True

Over 3/4 of breaches at banks could have been eliminated if they blocked any attempted entry from the Tor (dark web) internet addresses

True

Risk differences between traditional e-Commerce modes and wireless m-Commerce can be largely attributed to the different communication platforms used to access the company's computers. To hack an e-commerce transaction you need to actually tap a wired connection. With m-commerce you only need to be listening nearby

True

Setting up a filtering process to combat multiple pings (or calls) upon the website of a company experiencing a DoS attack is an active defense mechanism

True

Five ways to block most malware

Use your firewall/email filtering to block the most commonly abused file types. Lock down Microsoft Office. Prevent VBScript and JavaScript abuse. Use endpoint protection that improves on antivirus Put restrictions on PowerShell

With this type of liability, the liability of one person may be based on the tort of another. An employer, for example, may be liable for damages caused by the negligence of an employee who is on duty. Identify this type of liability.

Vicarious liability

domain namehijacking

When an individual or abusiness reserves adomain name that usesthe trademark of acompetitor.

Negligence

While the source of liability may be intentional or unintentional, more often it is unintentional, which involves

antivirus software

a computer program used to prevent, detect, and remove malware once it shows up

Honeypot

a fake network with known exploits that is connected to the real network used to lure attackers. Makes fake network easier to enter so exploiters target fake network instead of harder real target

Firewall

a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Filtering

active defense used to stop DoS attacks before servers are down.

In some cases, small children are attracted by dangerous objects or property. In such circumstances, the owner has a special duty toward the children, especially if they are too young to be responsible for their own safety. Pools and trampolines are common examples of this source of liability, which is known as:

an attractive nuisance

phishing

appears to comre from trusted individual or institution but is actually fradulent

deals with acts that are not against society, but rather cause injury or loss to an individual

civil law

The ____ clause has two provisions. First, it requires you to carry an amount of insurance equal to a specified percentage of the value of the property if you wish to be paid the amount of loss you incur in full, and second, it stipulates a proportional payment of loss for failure to carry sufficient insurance....Under this clause, a property is considered fully covered if coverage is at least

coinsurance... 80%

on the other hand, is based on custom and court decisions.

common law

Liability stemming from activities of the firm in installing equipment or doing other jobs for hire off its own premises

completed operations liabiltiy

Situation in which a firm is liable for an independent contractor's negligence because the firm did not use reasonable care in selecting someone competent.

contingent liability

Civil liability may derive from either:

contracts or torts

When the terms of a contract are not carried out as promised by either party to the contract this is known as:

contractual liability

occurs when the terms of a contract are not carried out as promised by either party to the contract.

contractual liability

A number of defenses against negligence exist, with varying degrees of acceptance. Which of the following are valid defenses against negligence?

contributory negligence, comparative negligence, immunity, last clear chance, assumption of risk

Passive Defense

defenses that try to keep an attacker from being able to successfully enter the computer system. It is passive in that it sets up barriers or compares to known lists of viruses without proactively changing the environment

what kind of global risk? Severe inflation

economic

Professionals' mistakes can result in professional liability claims. The insurance protection for this type of risk is:

errors and omissions liability coverage

What kind of global risk? Democratic Election

political risk

what kind of risk? Coup

political, conflict

vulnerability

potential for harm to the community. physical assets, social capital, political access... mitigated by effective measures

Situation in which a manufacturer may be liable for harm caused by use of its product, even if the manufacturer was reasonable in producing it.

product liability

Awards intended to punish an offender for exceptionally undesirable behavior.

punitive damages

How to reduce travel risk

safe travel planning, arrival procedures, prudent behavior during the stay, departure procedures, coping with captivity

why at risk

unfamiliar territory, perceived wealth, high profile

cookie theft

used to access online accounts.... steal usernames and passwords

clickjacking/UI redressing

user thinks they click on a link but unwittingly click on a hidden one and taken to different location

crackers

vandals who want to break into a company's security network and steal proprietary info for personal gain

Hackers

virtual vandals who try to poke holes in a company's security network

ransomware

which holds data hostage until a ransom ispaid (usually in cryptocurrency). Ransomware makes infected data inaccessible, often by encrypt-ing it. Individuals as well as organizations of all sizes—including police departments andhospitals—have been the targets of ransomware attacks.

Active Defense

will search and respond accordingly to prevent or retaliate during an attack. Is proactive.

examples of catastrophic risk natural sources

wind, fire, ice, earthquake, water, climate

Classic Threats of cyber

ØInsiders ØDisgruntled employees ØDisgruntled contractor ØActive agencies ØCompetitors ØOrganized crime

Cyber Threat Sources

ØNational Governments ØTerrorists ØIndustrial Spies and Organized Crime Groups ØHacktivists ØHackers

Third-party cyber liability insurance is available with coverage that typically protects liability arising from:

ØUnauthorized access of confidential information from the commercial entity's computer system. ØAccidental release of confidential information. ØTransmission of Malware to a third party.

Businesses can take loss-control steps to reduce the cyber risk (cyber risk is part of e-commerce)and business interruption by using the following:

• Security products and processes,• System audits,• Antivirus protection,• Backup systems and redundancies,• Data protection and security,• Passwords,• Digital signatures,• Encryption,• Firewalls,• Virtual private network (VPN),• Hiring ethical or "white hat" hackers to identify security flaws.


Related study sets

IT Project Management Mid-Term (ch 1-6), IT Project Management Final (Ch. 7,8,9,10, & 12), Project Management Exam 2 - Teacher's guide, Project Management Exam 2 - Wiley Plus, Chapter 7, Chapter 6; Project Activity Planning, Project Management: PMI R...

View Set

PrepU Ch7 Legal Dimensions of Nursing Practice

View Set

Ch. 4 - Activity-Based Costing - ACCT 2302

View Set

SERVSAFE CH6: The flow of food: purchasing and receiving

View Set

Texas Real Estate - Contract Law Review

View Set

2.3 Review - The Cost of Goods Manufactured Schedule

View Set

UCLA Psych 110 Final: Experiments

View Set

Chapter 18 Vocab and the Age of the city

View Set