DOMAIN 2 — IT RISK ASSESSMENT (20%)

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following methods uses risk scenarios when estimating the likelihood and impact of significant risk to the enterprise?

  • An IT audit
  • An IT security assessment
  • A threat and vulnerability assessment (correct)
  • A security gap analysis

An enterprise desires a quick implementation of a crucial technical solution that deviates from company policy. What action should the risk practitioner take FIRST?

  • Recommend against implementation due to policy violation.
  • Recommend immediate revision of the current policy.
  • Recommend a risk assessment and subsequent implementation, only if residual risk is accepted. (correct)
  • Conduct a risk assessment and decide based on the outcome.

Which of the following will produce comprehensive results when performing a qualitative risk analysis?

  • Scenarios with threats and impacts (correct)
  • Estimated productivity losses
  • A vulnerability assessment
  • The value of information assets

Under what condition may risk be removed from the risk register?

<p>The risk is no longer relevant. (C)</p> Signup and view all the answers

What is the BEST way to ensure that an accurate risk register is maintained over time?

<p>Publish the risk register centrally with workflow features that periodically poll risk assessors. (A)</p> Signup and view all the answers

When should a risk practitioner add an emerging risk to the risk register?

<p>When the activity that triggers the risk begins to initiate (C)</p> Signup and view all the answers

What is the PRIMARY objective of a risk management program?

<p>Maintain residual risk at an acceptable level (B)</p> Signup and view all the answers

What is the function of risk assessment techniques for a risk practitioner?

<p>Justify the selection of risk mitigation strategies. (A)</p> Signup and view all the answers

A procurement employee discovers that new printer models retain copies of printed documents on a hard disk. What should the employee do FIRST?

<p>Notify the security manager to conduct a risk assessment. (D)</p> Signup and view all the answers

Why should risk assessments be repeated at regular intervals?

<p>Business threats are constantly changing. (B)</p> Signup and view all the answers

What is the BEST way to approach the assessment of risk to information systems assets?

<p>Evaluating threats associated with existing information systems assets (B)</p> Signup and view all the answers

What does a lack of adequate controls represent?

<p>A vulnerability (B)</p> Signup and view all the answers

An enterprise learns of a security breach at another entity using similar network technology. What is the MOST important action for a risk practitioner to take?

<p>Assess the likelihood of the incident occurring at the risk practitioner's enterprise. (D)</p> Signup and view all the answers

Detection of changes in which of the following is the MOST likely trigger to conduct a comprehensive risk assessment?

<p>The business environment (D)</p> Signup and view all the answers

Which risk identification technique BEST supports an enterprise seeking anonymous risk input from employees?

<p>The Delphi technique (B)</p> Signup and view all the answers

Which description BEST reflects the information needed for each risk in a risk register?

<p>Risk scenario including date, description, impact, probability, risk score, mitigation action and owner (B)</p> Signup and view all the answers

What is the GREATEST advantage of performing a business impact analysis (BIA)?

<p>It promotes continuity awareness in the enterprise (D)</p> Signup and view all the answers

What is the PRIMARY advantage of creating and updating a risk register?

<p>Ensure that an inventory of identified risk is maintained (B)</p> Signup and view all the answers

Which option BEST assists a risk practitioner in measuring the existing development level of risk management processes against the desired state?

<p>A capability maturity model (D)</p> Signup and view all the answers

Which of the following is MOST effective in assessing business risk?

<p>Risk Scenarios (A)</p> Signup and view all the answers

In which risk management process does the preparation of a risk register begin?

<p>Risk Identification (C)</p> Signup and view all the answers

What is a business impact analysis (BIA) used for PRIMARILY?

<p>Evaluate the impact of disruption on an enterprise's ability to operate over time (C)</p> Signup and view all the answers

Risk scenarios enable the risk assessment process because they:

<p>Help estimate the frequency and impact of risk (A)</p> Signup and view all the answers

Which information in the risk register helps the MOST in developing accurate risk scenarios?

<p>A list of potential threats to assets (D)</p> Signup and view all the answers

What BEST helps identify information systems control deficiencies?

<p>Gap analysis (A)</p> Signup and view all the answers

When assessing the performance of a critical application server, from what can the MOST reliable assessment results be obtained?

<p>Continuous monitoring (D)</p> Signup and view all the answers

Which situation presents the GREATEST risk when updating the risk register?

<p>Updates are carried out annually (C)</p> Signup and view all the answers

How is IT risk measured?

<p>Impact on Business Operations (B)</p> Signup and view all the answers

Deriving the likelihood and impact of risk scenarios through statistical methods can BEST be described as:

<p>Quantitative Risk Analysis (B)</p> Signup and view all the answers

During an internal risk assessment, a risk manager notes that local management has proactively mitigated a high-level risk related to the global purchasing process. Which of the following accurately reflects responsibility?

<p>Corporate management remains responsible for the risk. (B)</p> Signup and view all the answers

Which of the following BEST estimates the likelihood of significant events affecting an enterprise?

<p>Scenario analysis (C)</p> Signup and view all the answers

Which of the following BEST improves decision-making related to risk?

<p>Maintaining a documented risk register of all possible risks (D)</p> Signup and view all the answers

What is the PRIMARY reason to have the risk management process reviewed by an independent risk management professional?

<p>Assess the validity of the process end to end (D)</p> Signup and view all the answers

What review is BEST suited for IT risk analysis results before they are sent to management for approval and decision making?

<p>A peer review (A)</p> Signup and view all the answers

What is the FIRST step in identifying and assessing IT risk?

<p>Gather information on the current and future environment (A)</p> Signup and view all the answers

Risk scenarios should primarily be created based on which of the following:

<p>Threats that the enterprise faces (B)</p> Signup and view all the answers

Which of the following triggers performance of an internal ad hoc risk assessment BEFORE the annual occurrence?

<p>A new system is introduced into the environment. (B)</p> Signup and view all the answers

When a start-up company becomes popular, and suddenly is the target of hackers, what is this considered?

<p>An Emerging Threat (B)</p> Signup and view all the answers

To gain a thorough understanding of what, is the PRIMARY reason an external risk assessment team reviews documentation as the first step in a risk assessment?

<p>The enterprise's business processes (D)</p> Signup and view all the answers

When using a maturity model for assessing the risk management process, which capability dimensions is MOST important?

<p>Performance (A)</p> Signup and view all the answers

Flashcards

Threat and vulnerability assessment

Evaluates business process elements for threats/vulnerabilities, identifying likelihood and business impact if realized.

Risk practitioner's role

Clarify risk when policies can't be followed; implement solution only if related risk is formally accepted.

Comprehensive qualitative risk analysis

Using possible threat scenarios better frames the range of risk and facilitates informed decisions.

Maintaining a Risk Register

Ensures accuracy by enabling periodic polling of risk assessors through workflow features.

Signup and view all the flashcards

Primary Objective of Risk Management

Ensuring residual risk remains at an acceptable level for the business

Signup and view all the flashcards

Use of Risk Assessment Techniques

Justify and implement risk mitigation strategy efficiently.

Signup and view all the flashcards

Importance of risk assessment

Yields risk mitigation techniques appropriate for the enterprise risk context.

Signup and view all the flashcards

Assessing Information System Risk

Threats and vulnerabilities evaluated using qualitative/quantitative risk assessment approaches.

Signup and view all the flashcards

When to add emerging risk

Risk identification starts when planning an activity.

Signup and view all the flashcards

What is a vulnerability?

A weakness exposing sensitive information to malicious damage or attack

Signup and view all the flashcards

Learning of a security breach

Assess if it will occur at the practitioner's enterprise.

Signup and view all the flashcards

Triggering a Comprehensive Risk Assesment

Changes in the business environment will trigger risk assessment.

Signup and view all the flashcards

Delphi Technique

Polling or gathering information between interviewer/interviewee done anonymously or privately

Signup and view all the flashcards

Information in a risk register

Date, description, impact, probability, risk score, mitigation action, and owner.

Signup and view all the flashcards

Greatest advantage of Business Impact Analysis (BIA)

Raises enterprise-wide awareness of risk to business recovery and continuity.

Signup and view all the flashcards

Advantage of updating Risk Register

Ensure an inventory of risk is maintained.

Signup and view all the flashcards

The Capacity Maturity Model

Grading processes based on their maturity on a scale of 0 to 5.

Signup and view all the flashcards

Risk Scenarios

Best technique in assessing business risk

Signup and view all the flashcards

Business Impact Analysis (BIA)

Evaluates the impact of disruption over time

Signup and view all the flashcards

Risk Scenarios used in Assessment

Estimate frequency and impact of risk

Signup and view all the flashcards

Gap Analysis

Enables control deficiencies, gap between desired objectives and effective design/operations.

Signup and view all the flashcards

Continuous Monitoring

Track key performance metrics to quickly address critical issues with minimum impact.

Signup and view all the flashcards

Updating Risk Register annually

Risk register does not reflect true status of IT risk of the enterprise

Signup and view all the flashcards

IT Risk Measured

By its impact on business operations

Signup and view all the flashcards

Quantitative Risk Analysis

Deriving probability and impact from the use of statistical techniques

Signup and view all the flashcards

Mitigation in Global Enterprise

Corporate management still owns it.

Signup and view all the flashcards

Scenario Analysis

With vulnerability analysis, best determines whether a risk is relevant.

Signup and view all the flashcards

Documented risk register

A risk register captures the population of risk scenarios and provides a basis for their prioritization

Signup and view all the flashcards

Primary reason to review

Validates the whole end-to-end risk management process.

Signup and view all the flashcards

Peer Review: IT Risk Analysis

Effective, efficient and good practice

Signup and view all the flashcards

First Step: Identify IT Risk

Gather info about the pending changes to enterprise environment.

Signup and view all the flashcards

Important factors to consider

Likelihood or threat action occurring.

Signup and view all the flashcards

Ad Hoc Risk assessment

The level of new/added risk needs assessing.

Signup and view all the flashcards

Emerging threat, start-up

The opportunity for a start up company for hackers is because its a threat

Signup and view all the flashcards

Primary reasons External Risk Assessment

Gain a thorough understanding of the business processes.

Signup and view all the flashcards

Capability Dimensions, Maturity model

Performance of the implemented process fulfils its purpose

Signup and view all the flashcards

Define vulnerability

A weakness because the premium has been lapsed

Signup and view all the flashcards

What value does a risk register have?

They serve as reference for making judgements on risk

Signup and view all the flashcards

Main risk assessments objective

To detect possible threats that may affect the business

Signup and view all the flashcards

Best use of a maturity model

Maturity models can be used to help identify gaps current and desired state

Signup and view all the flashcards

Study Notes

IT Risk Assessment Overview

  • IT risk assessment estimates significant risk likelihood and impact
  • Utilizes risk scenarios for estimation
  • Focuses on all business process components for threats and vulnerabilities
  • Identifies occurrence likelihood
  • Determines the business impact of realized threats

Technical Solution Implementation

  • In cases of critical business importance where technical solutions deviate from policies, conduct a risk assessment
  • Implement the solution only if related risk has formal enterprise acceptance

Qualitative Risk Analysis

  • In qualitative risk analysis that involves scenarios with threats and impacts, comprehensive results obtained
  • Frames the risk range
  • Facilitates informed discussions and decisions

Risk Register Management

  • When a risk is no longer relevant, remove it from the risk register

Maintaining an Accurate Risk Register

  • Publish the risk register centrally
  • Use workflow features for periodic polling of risk assessors
  • Employ a knowledge management platform featuring workflow and polling to automate register maintenance

Emerging Risk Addition

  • An emerging risk should be added when the triggering activity has initiated

Risk Management Program Objectives

  • The primary goal is to maintain residual risk at an acceptable level for the business

Risk Assessment Technique Application

  • Apply risk assessment techniques to efficiently justify and implement risk mitigation strategies

Printer Security Protocol

  • Upon noticing new printer models retain document copies on an internal hard disk, notify the security manager
  • Risk assessment determines appropriate mitigation techniques relative to enterprise risk context and appetite

Repeated Risk Assessments

  • Conducted at regular intervals because business threats are constantly evolving

Assessing Information System Risk

  • Best achieved by evaluating threats linked to existing informational assets

What a Lack of Adequate Controls Represents

  • Indicates a vulnerability, sensitive information and exposing data

Incident Response Protocol

Assess likelihood of similar incident at the risk practitioner's enterprise upon security breach at another entity

Most Likely Trigger for Risk Assessment

  • Detected business environment changes triggers comprehensive periodic risk assessment

Technique For Identifying Risk

  • Anonymous risk identification via Delphi technique involves polling anonymously or privately

Key Info Need For Each Risk

  • Mitigation action and owner to be specified

Greatest Advantage Of Impact Analysis

  • Raises enterprise-wide awareness of risk to business recovery and continuity

Primary Advantage

  • Maintain an inventory of identified risk

Tool For Measuring Risk

  • Capability maturity model assists in measuring existing levels for management

Technique For Assessing Business Risk

  • Risk scenarios are valuable in determining identified risk's likelihood and impact

Risk Register

  • The risk register details all identified risks
  • Risk register identifies the inclusion category, cause, and probability of impacting objectives
  • Identifies proposed responses, owners, and current status

Business Impact

  • Its primary use is to evaluate the impact of disruption over time on an enterprise's ability to operate

Enablement For Frequency

  • When used correctly, risk scenarios aid by making clear 2 key elements

Identifying Business Assets Is Key For:

  • Identifying vulnerabilities that will contribute to the risk scenarios

Identifying Info Systems

  • Gap analysis helps to identify potential deficiencies

Assessing Performance

  • Continuous monitoring can help to track key performance metrics and possibly prevent potentially related issues

Greatest Risk

  • Updating the register annually means that it does not show real number for IT risk

Main Measurement

  • IT risk is measured mainly by its impact on Business operations

Likelihood And Impact

  • Quantitative derives risk, with statistical and data methods

Responsibilities

  • The corporate management has the responsibility of a risk - even when response is being executed low on the latter

Scenarios and Analysis

  • Scenarios and vulnerability analysis determines risks

Risk Register Capture

  • Maintaining a documented risk register improves the relationship and responses

Primary Reasons

  • The primary method is to have process reviewed to end with the end-to-end process

Results Sent

  • Effciency with good peer result analysis

Steps To Minimize IT Risk

  • The first step would to gather information

Scenarios Should Be Based On The Following

  • Scenarios need to be based risks the company faces

Introducing New Risks

Introducing mew systems will increase over all risk

New Hacker Targets

  • A threat to potentially new hackers

To gain through understanding of an external risk assessment team reviews documentation

  • Encompasses business processes

Risk management Process

  • Achieved when the process implemented, in its perforce

The Type

  • A weakness can be a vulnerability based on management

Provides Detailed Info

  • Registers provide related information by supplying activities along decision making skills

The Main Objective

  • Detection and documentation

A Maturity Model

  • Should help when identifying potential efforts to mediate

The alignment

  • The main alignment is related to prioritizing

Likelihood and impact

  • Determine the magnitude if they determine it a loss

Benefits Of A Register

  • With a register, there is now likely a impact with prioritization

Prevent Low Level Risks

  • Address more with a series of attacks.

Total Impact

  • A professional makes quantitative measurments to help measure

Should Be Available

  • Risk should be in the register

To Establish

  • To compare future results

The Important Items

  • Are Business objectives

Evaluation

  • To take in mind the size and likelihood of loss

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

IT Risk Assessment Process Overview
9 questions
Quiz 5 - IT Risk Management
10 questions
IT Risk Management Quiz
13 questions
BAB II Manajemen Resiko TI
45 questions

BAB II Manajemen Resiko TI

FaithfulHarpGuitar3647 avatar
FaithfulHarpGuitar3647
Use Quizgecko on...
Browser
Browser