Module 6: Risk Management Overview
48 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of Early Warning Indicators in risk management?

  • To increase the risk exposure
  • To eliminate the risk entirely
  • To keep track of early signs of risks (correct)
  • To delay decision-making
  • Internal sources of risk can be controlled to a certain extent.

    True

    What should organizations cultivate to enhance risk management processes?

    Supportive culture

    The _____ cycle involves evaluating inputs at each step of the risk management process.

    <p>Review</p> Signup and view all the answers

    Which principle of risk management involves considering the various external factors affecting an organization?

    <p>Organizational Context</p> Signup and view all the answers

    Match the following principles of risk management to their descriptions:

    <p>Organizational Context = Factors affecting an organization Continual Improvement = Enhancing risk management strategies Supportive Culture = A culture of discussing risks Review Cycle = Evaluating inputs continuously</p> Signup and view all the answers

    What element of risk management involves brainstorming and enabling discussion?

    <p>Supportive culture</p> Signup and view all the answers

    The PMBOK contains principles that can enhance risk management processes.

    <p>True</p> Signup and view all the answers

    What is a primary consideration when making decisions related to information security?

    <p>Risk-based approach</p> Signup and view all the answers

    Information security policies are detailed procedures that describe specific actions to be taken.

    <p>False</p> Signup and view all the answers

    What must be determined before writing information security policies?

    <p>The overall goal of the policy</p> Signup and view all the answers

    The responsibility for conducting the GSI strategy often leads to headaches regarding the right __________ decisions.

    <p>investment</p> Signup and view all the answers

    Match the investment areas with their corresponding focus:

    <p>Hardware = Physical assets protection Software = Program and application security Access = User entry and permissions management People = Human resource security</p> Signup and view all the answers

    Which of the following is NOT considered an aspect of information security compliance?

    <p>Personal preferences</p> Signup and view all the answers

    Information security policies should align with corporate risk management models.

    <p>True</p> Signup and view all the answers

    What approach should be taken to ensure information security?

    <p>Risk-Based Approach</p> Signup and view all the answers

    What is the primary purpose of a business continuity plan?

    <p>To ensure operations can be maintained during disasters</p> Signup and view all the answers

    Senior management should not be involved in the creation of the business continuity plan.

    <p>False</p> Signup and view all the answers

    What is the first step in developing a business continuity plan?

    <p>Identify the scope of the plan</p> Signup and view all the answers

    The person responsible for the integrity and security of an asset is called the __________.

    <p>owner</p> Signup and view all the answers

    Match the following terms with their definitions:

    <p>Authorization = Permission to perform certain actions Access = Means to reach and use a resource Business Impact Analysis = Assessment of vulnerabilities and losses Downtime = Period when a function is not operational</p> Signup and view all the answers

    What is the primary role of a custodian in a system?

    <p>To maintain the security of a system</p> Signup and view all the answers

    What should a business continuity plan assess in order to identify vulnerabilities?

    <p>Business processes and potential losses</p> Signup and view all the answers

    Authentication is the process of granting permissions that are linked to the user's account.

    <p>False</p> Signup and view all the answers

    Acceptable downtime must be determined for each critical function.

    <p>True</p> Signup and view all the answers

    What is the term used for a person who simply uses the asset without the ability to change access rights?

    <p>End User</p> Signup and view all the answers

    What is the definition of 'dependencies' in the context of a business continuity plan?

    <p>Dependencies refer to the relationships between various business areas and functions that are interconnected.</p> Signup and view all the answers

    Identification is simply entering a user __________.

    <p>name</p> Signup and view all the answers

    Which of the following is NOT one of the three key elements of security?

    <p>Decryption</p> Signup and view all the answers

    A supplicant refers to a requester in the context of authentication.

    <p>True</p> Signup and view all the answers

    Most security is based on one or more of three types of things: something you have, something you know, and something you __________.

    <p>are</p> Signup and view all the answers

    Match the following roles or terms with their descriptions:

    <p>Custodian = Maintains system security End User = Uses the asset without permission changes Authentication = Confirming identity Authorization = Granting account permissions</p> Signup and view all the answers

    Which access control model allows the owner to define the security policy?

    <p>Mandatory Access Control (MAC)</p> Signup and view all the answers

    Role Based Access Control (RBAC) grants access based on individual identities rather than roles.

    <p>False</p> Signup and view all the answers

    What is the primary function of a packet-filtering firewall?

    <p>To examine and filter network packets based on predefined rules.</p> Signup and view all the answers

    Discretionary Access Control (DAC) is known as the ______ restrictive model.

    <p>least</p> Signup and view all the answers

    Which of the following is NOT a type of firewalls classified by their processing type?

    <p>Nondiscretionary firewalls</p> Signup and view all the answers

    What does Task Based Access Control (TBAC) allow users to do?

    <p>Change access levels based on the tasks they are performing.</p> Signup and view all the answers

    Match the following access control models with their descriptions:

    <p>Mandatory Access Control (MAC) = Owner-defined security policy Discretionary Access Control (DAC) = Least restrictive model Role Based Access Control (RBAC) = Access granted based on user roles Task Based Access Control (TBAC) = Access changes based on user tasks</p> Signup and view all the answers

    Nondiscretionary controls allow end users to change the security policies.

    <p>False</p> Signup and view all the answers

    Which layer of the OSI Model is responsible for managing delivery and error checking of data packets?

    <p>Transport Layer</p> Signup and view all the answers

    A stateful firewall allows packets from any source address without prior connection agreements.

    <p>False</p> Signup and view all the answers

    What is one common example of a transport layer protocol?

    <p>TCP</p> Signup and view all the answers

    The _____ layer controls conversations between different computers in the OSI Model.

    <p>Session</p> Signup and view all the answers

    Match the following types of packet filtering firewalls with their descriptions:

    <p>Static = Rules set by a system administrator Dynamic = Rules set by the firewall for itself Stateful = Checks packets based on negotiated connections</p> Signup and view all the answers

    The presentation layer is responsible for encrypting and decrypting data.

    <p>True</p> Signup and view all the answers

    Which protocol is specified for allowing a packet if the source address is 192.168.0.1 and the destination address is 10.10.10.10?

    <p>FTP</p> Signup and view all the answers

    What is the role of the presentation layer in the OSI model?

    <p>Formats or translates data for the application layer</p> Signup and view all the answers

    Study Notes

    Module 6: Risk Management

    • Risk management is the process of minimizing or mitigating risk. It involves identifying, evaluating risk, and using resources to monitor and minimize it.
    • Prioritize risks based on potential loss and likelihood of occurrence.
    • Risk management involves four steps: assessment, evaluation/management, and impact measurement.
    • Risk sources can be internal or external. External sources are uncontrollable (e.g., weather), while internal sources are controllable.
    • Various organizations have risk management principles outlined by the International Standardization Organization (ISO) and the Project Management Body of Knowledge (PMBOK). The PMBOK has 10 principles.
    • Risk management considerations include organizational context, stakeholder involvement, organizational objectives, reporting, roles, responsibilities, support structure, early warning indicators, review cycle, and supportive culture.
    • Continual improvement in risk management strategies is key.

    Module 7: Information Security Governance

    • Information security governance (GSI) directs and controls information security activities within an organization.
    • Similar to IT Governance, it's an evolving organizational governance structure.
    • Various models exist with different levels of functionality.
    • Policies are high-level plans outlining information security goals.
    • Policies must determine what's being protected and why.
    • Policies cover hardware, software, access, people, connections, network, and telecommunications. Policies also cover enforcement.
    • Security must comply with internal and external laws/regulations, including General Data Protection (GDPR).
    • Security and compliance principles should be consistent with business objectives.
    • Security must promote a positive network environment, as human behaviour is a crucial factor in security.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    IAS Midterm - Reviewer PDF

    Description

    Explore the essential concepts of risk management in this quiz. Understand the four key steps involved, the distinction between internal and external risk sources, and the guiding principles from ISO and PMBOK. Test your knowledge on prioritizing risks and the considerations necessary for effective management.

    More Like This

    ISO 31000 Risk Management Framework
    6 questions
    ISO 27001 Principes
    13 questions

    ISO 27001 Principes

    ReplaceableBanjo avatar
    ReplaceableBanjo
    Use Quizgecko on...
    Browser
    Browser