ISC2 CHAPTER 1: Module 2: Understand the Risk Management Process
Qualitative Risk Analysis
A method for risk analysis that is based on the assignment of a descriptor such as low, medium or high. Source: NISTIR 8286
Quantative Risk Analysis
A method for risk analysis where numerical values are assigned to both impact and likelihood based on statistical probabilities monetarized valuation of loss or gain. Source: NISTIR 8286.
Risk
A possible event which can have a negative impact upon the organization.
Likelihood of Occurrence
A weighted factor based on a subjective analysis of the probability that a given threat is capable of exploiting a given vulnerability or set of vulnerabilities.
Threat Actors
An individual or a group that attempts of exploit vulnerabilities to cause or force a threat to occur.
Threat
Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image or reputation), organizational assets, individuals, other organizations or the nation through an information system via unauthorized access, destruction, disclosure, modification of information and/or denial of service. Source: NIST SP 800-30 Rev 1
Asset
Anything of value that is owned by an organization. Assets include both tangible items such as information systems and physical property and intangible assets such as intellectual property.
Risk Identification
Recurring process of identifying different possible risks, characterizing them and then estimating their potential for disrupting the organization. Takeaways to remember about risk identification: 1- identify risk to communicate it clearly. 2- Employees at all levels of the organization are responsible for identifying risk. 3- Identify risk to protect against it.
Risk Acceptance
Risk acceptance is taking no action to reduce the likelihood of a risk occurring. Management may opt for conducting the business function that is associated with the risk without any further action on the part of the organization, either because the impact or likelihood of occurrence is negligible, or because the benefit is more than enough to offset that risk.
Risk Avoidance
Risk avoidance is the decision to attempt to eliminate the risk entirely. This could include ceasing operation for some or all of the activities of the organization that are exposed to a particular risk. Organization leadership may choose risk avoidance when the potential impact of a given risk is too high or if the likelihood of the risk being realized is simply too great.
Risk Mitigation
Risk mitigation is the most common type of risk management and includes taking actions to prevent or reduce the possibility of a risk event or its impact. Mitigation can involve remediation measures, or controls, such as security controls, establishing policies, procedures, and standards to minimize adverse risk. Risk cannot always be mitigated, but mitigations such as safety measures should always be in place.
Risk Transference
Risk transference is the practice of passing the risk to another party, who will accept the financial impact of the harm resulting from a risk being realized in exchange for payment. Typically, this is an insurance policy.
Artificial Intelligence
The ability of computers and robots to simulate human intelligence and behavior.
Probability
The chances, or likelihood, that a given threat is capable of exploiting a given vulnerability or a set of vulnerabilities. NIST SP 800-30 REV 1.
Risk Treatment
The determination of the best way to address an identified risk.
Risk Tolerance
The level of risk an entity is willing to assume in order to achieve a potential desired result. Source: NIST SP 800-32. Risk threshold, risk appetite and acceptable risk are also terms used synonymously with risk tolerance.
Impact
The magnitude of harm that could be caused by a threat's exercise of a vulnerability.
Threat Vector
The means by which a threat actor carries out their objectives.
Information security risk
The potential adverse impacts to an organization's operations (including its mission, functions and image and reputation), assets, individuals, other organizations, and even the nation, which results from the possibility of unauthorized access, use, disclosure, disruption, modification or destruction of information and/or information systems.-----------Reflects the potential adverse impacts that result from the possibility of unauthorized access, use, disclosure, disruption, modification or destruction of information and/or information systems. This definition represents that risk is associated with threats, impact and likelihood, and it also indicates that IT risk is a subset of business risk.
Likelihood
The probability that a potential vulnerability may be exercised within the construct of the associated threat environment.
Risk Assessment
The process of identifying and analyzing risks to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals and other organizations. The analysis performed as part of risk management which incorporates threat and vulnerability analyses and considers mitigations provided by security controls planned or in place.
Risk Management
The process of identifying, evaluating and controlling threats, including all the phases of risk context (or frame), risk assessment, risk treatment and risk monitoring.
Vulnerability
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
vulnerability
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
Bots
malicious code that acts like a remotely controlled "robot" for an attacker, with other Trojan and Worm capabilities.