Security Threats and Asset Protection

ReadableHaiku avatar
ReadableHaiku
·
·
Download

Start Quiz

Study Flashcards

18 Questions

What is the risk level description that requires detailed research and management planning at an executive/director level?

Extreme (E)

According to the risk matrix, what is the consequence of an 'Almost Certain' risk with a 'Major' impact?

Extreme (E)

What is the likelihood of a risk that is described as 'Unlikely' in the risk matrix?

Unlikely

Which of the following risks would have a 'Catastrophic' consequence?

Doomsday

What is the purpose of a risk matrix in risk assessment?

To categorize risks based on their likelihood and impact

What is the potential outcome of a threat exploiting vulnerabilities in a system?

Loss or damage to the system

What is the primary goal of a detailed security risk assessment?

To identify vulnerabilities in a system

What is the relationship between a threat and an asset in a risk assessment?

A threat exploits the vulnerabilities of an asset

What is the term for the likelihood that a threat will occur and cause harm to a system?

Threat likelihood

What is the process of evaluating the potential impact of a threat on a system?

Impact determination

What is the primary goal of identifying vulnerabilities in an organization's IT systems or processes?

To determine the applicability and significance of threats to the organization

What is the formula used to derive the overall risk rating for each threat?

Risk = probability threat occurs x cost to organization

What type of ratings are used to determine the likelihood of occurrence of identified threats?

Qualitative ratings

What is the purpose of considering previous attacks to the organization?

To determine the likelihood of occurrence of identified threats

What is the definition of a vulnerability in the context of IT systems?

A weakness in an asset that can be exploited by a threat

What is the rating of a threat that might occur at some time, but is just as likely as not?

Possible

What is the purpose of specifying the consequence to the organization?

To derive the overall risk rating for each threat

What is the purpose of analyzing risks?

To order risks to prioritize treatment

Study Notes

Threats and Assets

  • Threats prevent assets from achieving confidentiality, integrity, availability, accountability, authenticity, and reliability.
  • Assets may have multiple threats.

Threat Sources

  • Threats can be either natural (fire, flood, storm, earthquake) or human-made (accidental or intentional).
  • Human-made threats can come from insiders (e.g., selling information for personal gain) or outsiders (e.g., hackers).

Human Attackers

  • Consider motivations, capabilities, resources, and probability of attack when evaluating human attackers.
  • Analyze previous attacks to the organization.

Vulnerability Identification

  • A vulnerability is a weakness in an asset that can be exploited by a threat.
  • Identify weaknesses in the organization's IT systems or processes to determine the applicability and significance of threats.
  • Use standard lists of potential vulnerabilities to identify weaknesses.

Risk Analysis

  • Specify the likelihood of occurrence of identified threats.
  • Specify the consequence to the organization if the threat occurs.
  • Derive an overall risk rating for each threat using a qualitative rating system.
  • Use a risk rating formula: risk = probability threat occurs x cost to organization.

Likelihood Determination

  • Use a 4-point scale to rate likelihood: Rare (1), Unlikely (2), Possible (3), Almost Certain (4).
  • Define each level: Rare (exceptional circumstances), Unlikely (could occur, but not expected), Possible (might occur, but just as likely as not), Almost Certain (very likely).

Determining Resultant Risk

  • Use a 5-point scale to rate consequences: Insignificant, Minor, Moderate, Major, Doomsday/Catastrophic.
  • Combine likelihood and consequence ratings to determine the resultant risk level.
  • Use a risk level matrix to determine the overall risk level: Extreme (E), High (H), Medium (M), Low (L).

Learn about the different types of threats that can compromise asset security, including natural and human-made threats, and how they affect confidentiality, integrity, and availability.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser