with Complete Solutions
What is the purpose of the asset assessment
step of the risk management process? - -• What is the purpose of the countermeasure
Identify assets requiring protection and/or that determination step of the risk management
are important to the organization and to national process? - -• Identify potential
security countermeasures to reduce vulnerability and/or
• Identify undesirable events and expected threat and/or impact
impacts • Identify countermeasure benefits in terms of risk
• Prioritize assets based on consequences of reduction
loss • Identify countermeasure costs
• Conduct cost/benefit analysis
• Prioritize options and prepare recommendation
for decision maker
What is the purpose of the threat assessment
step of the risk management process? - -•
Determine threats to identified assets
• Assess intent and capability of identified threats What is the primary benefit of conducting the risk
• Assess current threat level for the identified management process? - -• National-level
assets security policy endorses a holistic risk
management approach, allowing decision makers
to effectively allocate resources that provide the
necessary security to assets that match the
What is the purpose of the vulnerability threat to those assets
assessment step of the risk management
process? - -• Identify existing
countermeasures and their level of effectiveness
in reducing vulnerabilities What are the primary costs of conducting the risk
• Identify potential vulnerabilities related to management process? - -• Time and effort
identified assets and their undesirable events necessary to execute the five steps of the risk
• Identify current vulnerability level for the management process
identified assets that can be exploited by the
identified threats
What are the potential challenges security
practitioners may face when enacting the risk
What is the purpose of the risk assessment step management process? - -• Availability of
of the risk management process? - -• information necessary to accurately determine
Integrate information about the impact of the likelihood and impact of undesirable events
undesirable events (collected during the asset
assessment step) and the likelihood of
undesirable events (based on information
collected during the threat and vulnerability Where can we get information to evaluate an
assessment steps) to determine risks to organization's compliance with security policies?
identified assets - -• Self-inspections
1/4