Risk Management Foundations Flashcards

Understand the principles and process of managing strategic risks. (46 cards)

1
Q

What is the definition of risk according to the Enterprise Risk Management Framework by the IMA?

A

A risk is any event or action that can keep an organization from achieving its objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What distinguishes ‘risk’ from ‘uncertainty’?

A

Risk involves events that might cause harm, while uncertainty refers to events that are not known to occur and can lead to positive or negative outcomes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the benefits of effective risk management?

A
  • Improved shareholder value
  • Fewer operational disruptions
  • Better use of resources
  • Increased confidence among stakeholders
  • More effective strategic planning
  • Greater agility in responding to opportunities
  • More thorough contingency planning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the common categories of risk?

A
  • Business risk
  • Strategic risk
  • Operational risk
  • Financial risk
  • Hazard risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is business risk?

A

Refers to any factor that creates variability in earnings, such as fluctuations in demand or changes in input costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is strategic risk?

A

Encompasses risks at the organizational level, including macroeconomic risks, internal risks, and competitor actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is operational risk?

A

Results from deficiencies in internal processes, systems, or personnel, such as technological failures or cybersecurity breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is financial risk?

A

Involves threats to the organization’s financial health, such as difficulties in accessing capital or changes in interest rates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is hazard risk?

A

Includes insurable events like property damage or personal injury.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are internal risks?

A

They arise from within the company’s structure, processes, or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are external risks?

A

They stem from the broader environment in which the company operates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is systematic risk?

A

It refers to risks that affect the entire market or economy and cannot be eliminated through diversification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is unsystematic risk?

A

It is specific to a particular company or industry and can be mitigated through diversification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are common types of cyber threats?

A
  • Denial of Service (DoS) attacks
  • Buffer overflow attacks
  • Man-in-the-Middle (MitM) attacks
  • Password attacks
  • Malware
  • Ransomware
  • Zero-day exploits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ransomware?

A

It encrypts system data and demands payment for its release.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is social engineering in the context of cybersecurity?

A

It is the use of deception to manipulate people into revealing confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the three categories of logical access controls?

A
  • Something you know
  • Something you are
  • Something you have

These categories include knowledge-based factors like passwords, biometric data like fingerprints, and possession-based factors like authentication devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of encryption in cybersecurity?

A

To secure both stored data and data in transit by rendering it unreadable to unauthorized users.

Encryption ensures that even if data is intercepted, it remains unintelligible without the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the role of ethical hacking in cybersecurity?

A

To simulate attacks on systems with an organization’s permission to uncover vulnerabilities before malicious actors can exploit them.

Ethical hacking involves vulnerability testing and penetration testing to assess real-world risk.

20
Q

What differentiates advanced firewalls from traditional firewalls?

A

Advanced firewalls inspect the actual content of data packets, distinguishing between safe and unsafe applications, even if using the same communication protocols.

These are also known as Next Generation Firewalls (NGFW).

21
Q

What is Two-Factor Authentication (2FA)?

A

A security process that requires two independent methods of verification before granting system access.

2FA significantly reduces the likelihood of unauthorized access by introducing an additional barrier to entry.

22
Q

What are the key components of the risk management process?

A
  • Risk identification
  • Risk assessment
  • Risk prioritization
  • Response planning
  • Risk monitoring

These steps help organizations systematically respond to uncertainties and align risk levels with company strategy and objectives.

23
Q

What is intellectual property (IP)?

A

Intangible creations such as inventions, written works, brand identifiers, and artistic expressions.

Common forms of IP include patents, copyrights, and trademarks, which are crucial for competitive advantage in many industries.

24
Q

What is the primary purpose of risk assessment in risk management?

A

To analyze and quantify identified risks in terms of likelihood, potential impact, and interaction with other risks across the organization.

Risk assessment helps evaluate the seriousness of risks and their potential effects on business outcomes.

25
What are the **common forms** of intellectual property risks?
* Infringement and unauthorized use * Improper use or transfer by licensees ## Footnote IP risks can lead to lost revenue, brand dilution, or reputational harm, especially if enforcement involves jurisdictions with varying legal protections.
26
What does **capital adequacy** ensure in risk management?
That a company has sufficient resources to implement its risk management plan and withstand potential disruptions. ## Footnote Capital adequacy is crucial for maintaining liquidity, solvency, and operational continuity during adverse events.
27
What are the **two categories** of risk considered in the risk management process?
* Inherent risk * Residual risk ## Footnote Inherent risk is the level of risk present before any mitigation actions, while residual risk is what remains after mitigation efforts.
28
What is **Inherent risk**?
It is the level of risk that exists in the absence of any controls or risk mitigation, reflecting the natural exposure to potential loss in a given activity, process, or environment.
29
What is **residual risk**?
It is the level of risk that remains after controls and risk mitigation strategies have been implemented.
30
What does a **risk map** visually represent?
The probability of each risk occurring and the severity of its potential financial impact. ## Footnote Risks are plotted on a horizontal axis (probability) and a vertical axis (potential loss), highlighting the most threatening risks in the upper right corner.
31
What is **Value at Risk** (VaR)?
It measures the potential loss in value of a risky asset as the result of a specific risk event over a defined period for a given confidence interval. ## Footnote VaR assumes outcomes follow a normal distribution, helping predict results with a measured level of confidence.
32
What is the purpose of **Cash Flow at Risk** (CFaR)?
It measures the likelihood that cash flows will drop by more than a specified amount over a given period. ## Footnote CFaR tests expected cash flows for sensitivity to specific risks.
33
What is the **difference** between expected loss and unexpected loss?
* Expected loss is the average amount management expects to lose from a specific risk event each year. * Unexpected loss is the amount that could be lost in a very bad year, greater than the expected loss, up to the maximum probable loss.
34
How is expected loss **calculated** for a single loss event with multiple possible outcomes?
By multiplying each possible loss amount by its probability and summing the results. ## Footnote This calculation represents the weighted average of possible losses given their probabilities.
35
What is the **role of benchmarking** in risk assessment?
It compares the company’s risk profile and potential impacts to those of similar companies, often using industry data or peer group analysis. ## Footnote It helps identify how a company's risk strategies compare to others in the industry.
36
What is an **unexpected loss** in risk management?
The amount that could likely be lost to the risk event in a very bad year that is greater than the amount budgeted for the expected loss, up to the maximum probable loss.
37
# Define: Maximum probable loss
The largest loss that could reasonably be expected under foreseeable circumstances.
38
What **factors** should be considered when estimating the probable maximum loss for real property?
* Building's physical characteristics * Size of the building * Presence of fire protection systems * Occupancy status
39
What is the **maximum possible loss**?
The greatest loss that could result from a particular risk, often referred to as catastrophic loss.
40
List the **five main types** of responses to risk.
* Avoiding or eliminating the risk * Reducing or mitigating the risk * Transferring or sharing the risk * Retaining the risk * Exploiting or accepting the risk
41
What is the importance of **risk monitoring**?
To ensure that the response remains effective and relevant as circumstances can change.
42
What role do **internal controls** play in risk mitigation?
They are effective tools for reducing, but not eliminating, the risk of errors or misconduct.
43
**Differentiate** between risk appetite and risk tolerance.
* Risk appetite is the general level of risk an organization is willing to accept. * Risk tolerance refers to the acceptable level of variation around specific objectives.
44
What is **diversification** in the context of risk reduction?
A strategy that spreads exposure across different activities, markets, or product lines to lower the chance of a catastrophic impact.
45
Name some **financial instruments** used to manage financial risk.
* Derivatives * Forward contracts * Futures * Options * Swaps
46
What is **contingency planning** in risk management?
Preparing 'what if?' scenarios in advance to react more quickly and effectively when adverse events occur.