What is IT risk
The potential for an unplanned event involving information technology to threaten an enterprise objective (probability * impact)
What is a downside risk?
probable negative outcome
What is a upside risk?
probable positive outcome
What are the components of the 4A framework?
What are the components of the security triad?
What are the three core disciplines of IT Risk Management?
What are the three possible reactions to IT risk types?
What are the four components of risk management?
What are the four crisis customer contact response strategies in data breaches?
What are the components of the defensive strategy?
2. Excuse (minimize responsibility)
What are the components of the Accommodative strategy?
2. Remedial actions (repair and control the damage)
What are the components of the Moderation strategy?
2. Justification (minimize the perceived damage)
What are the components of the Image renewal strategy?
What are the effects of the defensive strategy on stock price for high and low reputable firms?
High: no significant influence
low: negative, but not significant
What are the effects of the Accommodative strategy on stock price for high and low reputable firms?
High: no significant influence
low: negative, but not significant
What are the effects of the Moderation strategy on stock price for high and low reputable firms?
High: no significant influence
Low: Positive influence
What are the effects of the Image renewal strategy on stock price for High and low reputable firms?
High: no significant influence
Low: Positive influence
What is Identity and Acces Management (IAM)
The organizational process for authorizing people to have acces to applications, systems or networks
What are the three core disciplines of IT risk management?
What are the components of a Customer contact disclosure strategy?
When is availability the issue in a crisis and what is the response?
Cause: Ddos or database has been renamed
Response: stop responding to IP adress, rename file to original name
When is acces the issue in a crisis and what is the response?
Cause: security holes and malicious codes
Response: technology change/upgrade and remove suspicious files
When is accuracy the issue in a crisis and what is the response?
Cause: corrupted database or attacker changed data
Response: use backup