who is responsible for overseeing, enabling, and supporting the structering of IT and
information security functions to defend their information assets? - answer upper
management
Risk management framework - answer risk management involves discovering and
understanding answers to some key questions about risk associated with an
organizations information assets:
-risk identification
-risk analysis
-risk evaluation
-risk treatment
Risk Management - answer examine and document an organizations information
assets
**responsible for identifying and controlling the risks that an organization encounters.
the process of identifying risk, assessing its relative magnitude, and taking steps to
reduce it to an acceptable level
*involves two key areas:
-RM framework (planning)- overall structure of the straits planning and design for the
entirety of the organization's RM efforts- chart on ppt that has the executive governance
and support, framework design, framework implementation, framework monitoring and
review, and continuous improvement.
-RM process (Doing)- the implementation of risk management, as specified in the
framework- chart on ppt with risk assessment (risk identification, risk analysis, and risk
evaluation)
*RM framework (planning) guides the RM process (doing) which conducts the
processes of risk evaluation an remediation
risk identification - answer The recognition, enumeration, and documentation of risks
to an organization's information assets.
risk assessment - answer A determination of the extent to which an organization's
information assets are exposed to risk
*includes all elements of an organizations system: people, procedures, data, software,
hardware, and networking elements.
risk treatment (risk control) - answer the application of safeguards or controls that
reduce the risks to an organization's information assets to an acceptable level
, The roles of the communities of interest - answer (VERY SMART AND VERY
SPECIFIC TECHNICOLOGICAL PEOPLE) responsible for:
evaluating current and proposed risk controls
determining which control options are cost-effective for the organization
acquiring or installing the needed controls
ensuring that the controls remain effective
Risk appetite - answer quantity and nature of risk that organizations are willing to
accept as they evaluate the trade-offs between perfect security and unlimited
accessibility
* CAN EITHER BE LIKELIHOOD OR IMPACT DRIVEN
*the overall risk the company is willing to take
*the implementation of the RM plan, specifically the RM process is likely to be
influenced by the organizations risk appeitite
residual risk - answer the risk to information assets that remains even after current
controls have been applied
*the risk that has not been covered by one of the safeguards
risk tolerance (risk threshold) - answer the assessment of the amount of risk and
organization is willing to accept for a particular information asset
*there are many vulnerabilities that affect the risk appetite
what is the goal of information security? - answer to bring residual risk in alignment
with risk appetite
inherent risk - answer the risk that is common or expected within a particular asset
ex: McDonalds came out with a new menu item and someone is wanting to steal the
formula (they have an inherent risk for their new product, therefore they need to put
controls-patents- in place to protect the formula)
residual risk - answer the risk that remains after management implements internal
controls or some other response to risk
ex: the controls are so good, they have zero residual risk (not possible to get it to zero,
can get very close, but there will always be a residual risk-thats where controls come in)
Likehood - answer the probability that something/the event will happen/occur (high,
medium, and low)
*the overall rating- a numerical value of a defined scale- of the probability that a specific
vulnerability will be exploited or attacked, commonly referred to as a threat
*the likelihood of occurrence is a weighted risk factor based on an analysis of the
probability that a given threat is capable of exploring a given vulnerability. The likelihood
risk factor combines an estimate of the likelihood that the threat event will be initiated
with an estimate of the likelihood of impact.
*An assessment of likelihood of occurrence is typically based on: