SECURITY’S PRIMARY OBJECTIVE IS TO?
MANAGE RISKS BY BALANCING THE COST OF PROTECTION MEASURES TO THE BENEFIT OF THOSE MEASURES
THERE ARE SIX STEPS IN THE RISK ASSESSMENT PROCESS, NAME THEM
ASSESTS CAN BE CATEGORIZED INTO THREE CATEGORIES NAME THEM
ASSETS CAN BE VALUED USING TWO METHODS NAME THEM
2. COST OF LOSS FORMULA
THREATS CAN BE CHARACTERIZED AS (3 THINGS)
WHAT IS A VULNERABILITY?
IT’S A GAP OR WEAKNESS THAT ALLOWS A THREAT TO COMPROMISE AN ASSET OR FUNCTION
WHICH ALLOWS THE ORGANIZATION SOME LEVEL OF CONTROL, A THREAT OR VULNERABILITLY ?
VULNERABILITY
IMPACT IS USUALLY MEASURED IN ?
FINANCIAL TERMS
ANALYZING RISK CAN BE ACHIEVED IN 2 STEPS ?
2. PRIORITIZATING THE IDENTIFIED RISKS
ONE APPROACH TO DETERMINING RISK RESULTS USES A BASIC RISK FORMULA WHAT IS IT ?
(THREAT X VULNERABILITY X IMPACT) 1/3 = RISK
DETERMINING MITIGATION MEASURES CAN BE DONE USING 4 STEPS
WHATS THE DIFFERENCE BETWEEN QUALITATIVE AND QUANTITATIVE ASSESSMENTS?
QUALITATIVE USES A GENERAL RANGE
QUANTITATIVE USES SPECIFIC NUMERICAL VALUES
WHAT ARE THE 5 METHODS OF ADDRESSING RISK
WHAT IS A SECURITY SURVEY?
IT’S A THOROUGH EXAM OF A FACILITY, ITS OPERATIONS, SYSTEMS, AND PROCEDURES
A COST BENEFIT ANALYSIS TYPICALLY CONSISTS OF 3 FACTORS
WHAT ARE THREE SURVEY APPROACHES
A SWOT ANALYSIS FOCUSES ON WHAT 4 THINGS
WHAT ARE 5 CRITERIA OF A SECURITY REPORT?
WHAT ARE 4 THINGS THAT AUTOMATED TOOLS ARE GOOD AT ?
PROCESSING, ANALYZING, COMPARING, STORING LARGE AMOUNTS OF DATA
WHAT IS 1 THING THAT AN AUTOMATED TOOL IS NOT GOOD AT ?
ASSESSING THE INTANGIBLE FACTORS IN THE ASSESSMENT PROCESS