Bash, the Crucial Exams Chat Bot
AI Bot

Risk Management Fundamentals  Flashcards

ISC2 Certified in Cybersecurity (CC) Flashcards

FrontBack
Define quantitative risk assessmentA method that uses numerical values to assess likelihood and impact
Define risk assessmentThe process of analyzing potential risks by determining their likelihood and impact
How does insurance assist in risk managementBy transferring financial consequences of certain risks to an insurer
What are the main components of a risk assessmentIdentifying assets, threats, vulnerabilities, likelihood, impact
What does 'defense in depth' mean in cybersecurity risk managementA layered approach to security to mitigate risks at multiple levels
What does risk mitigation involveImplementing strategies to reduce the likelihood or impact of identified risks
What does the term 'impact assessment' meanEvaluating the consequences of a risk event occurring
What does the term "risk appetite" meanThe level of risk an organization is willing to accept
What is a common tool for visualizing risksA risk matrix or heat map
What is a key principle of risk communicationEnsuring all stakeholders understand the risks and management strategies
What is a threat actorAn individual, group, or entity that poses a threat to an organization
What is a vulnerability in the context of risk managementA weakness that can be exploited by a threat
What is an example of a risk mitigation strategyInstalling firewalls to prevent unauthorized access
What is meant by 'risk avoidance'An approach where risks are eliminated by avoiding activities that create them
What is meant by 'risk transfer'Shifting the consequences of a risk to a third party, such as through insurance
What is residual riskThe level of risk that remains after mitigation strategies are applied
What is risk managementThe process of identifying, assessing, and responding to risks to minimize their impact on objectives
What is the difference between a threat and a riskA threat is a potential danger, while a risk is the likelihood and impact of that danger occurring
What is the difference between proactive and reactive risk managementProactive involves anticipating and addressing risks before they occur; reactive involves responding to risks after they occur
What is the first step in risk managementRisk identification
What is the goal of risk prioritizationTo determine which risks to address first based on severity and likelihood
What is the NIST Risk Management FrameworkA structured approach to managing cybersecurity risks developed by the National Institute of Standards and Technology
What is the purpose of a control measure in cybersecurityTo reduce the likelihood or impact of a risk
What is the purpose of a risk registerA tool to document and monitor risks and their management plans
What is the role of a qualitative risk assessmentTo evaluate risks based on non-numeric criteria such as judgement or experience
What is the role of incident response in risk managementTo manage and limit damage after a cybersecurity event occurs
What is the significance of compliance in risk managementAdherence to regulations and standards reduces risks associated with legal and financial penalties
When is risk acceptance usedWhen the cost of mitigation exceeds the value or likelihood of the risk
Why is continuous monitoring important in risk managementTo ensure new risks are identified and managed promptly
Why is risk management essential in cybersecurityTo protect systems, data, and processes from vulnerabilities and threats
This deck explores core concepts of risk assessment, mitigation strategies, and the importance of risk management in cybersecurity decision-making.
Share on...
Follow us on...