Bash, the Crucial Exams Chat Bot
AI Bot

SSCP - Risk Identification, Monitoring, and Analysis  Flashcards

ISC2 Systems Security Certified Practitioner (SSCP) Flashcards

FrontBack
Define corrective controlA control used to restore a system or data to its original state after a security incident
Define detective controlA control designed to identify and alert to a security event after it has occurred
Define preventive controlA control that is implemented to stop a security incident from occurring
Define risk appetiteThe amount and type of risk an organization is willing to accept to achieve its objectives
Define risk toleranceThe acceptable level of deviation from the organization's risk appetite
Define threatAny potential event or circumstance that can cause harm to an asset, system, or organization
Define vulnerabilityA weakness in a system, design, procedure, or control that can be exploited by a threat
Explain Annualized Loss Expectancy (ALE)ALE is the predicted yearly financial loss due to a specific risk, calculated as SLE times annualized rate of occurrence
Explain Single Loss Expectancy (SLE)SLE is the monetary value of a single loss event, calculated as asset value times exposure factor
What are three types of controls used to mitigate risksPreventive, detective, corrective
What does 'impact' refer to in risk analysisThe potential damage or consequences resulting from a threat exploiting a vulnerability
What does 'likelihood' refer to in risk analysisThe probability of a threat materializing
What does the acronym CIA stand for in securityConfidentiality, Integrity, and Availability
What is a residual riskThe remaining risk after applying security controls or mitigating measures
What is a risk assessmentA systematic process to identify, evaluate, and prioritize risks to an organization's assets
What is a risk matrixA tool used to assess and prioritize risks by mapping their likelihood and impact
What is a risk registerA document that identifies and tracks risks, their impact, likelihood, and mitigation strategies
What is a security incidentAn event that threatens the confidentiality, integrity, or availability of information or systems
What is a zero-day vulnerabilityA vulnerability that is unknown to the vendor and has no available patch or fix
What is an attack vectorThe route or method used by a threat actor to exploit a vulnerability
What is qualitative risk analysisAn analysis method that uses subjective judgment to prioritize risks based on their impact and likelihood
What is quantitative risk analysisAn analysis method that assigns numerical values to risks and their potential impact
What is risk identificationThe process of determining potential threats and vulnerabilities to an organization's assets
What is risk monitoringThe ongoing process of assessing existing risks, monitoring residual risks, and identifying new risks
What is the primary goal of risk managementTo reduce the impact and likelihood of risks affecting an organization's objectives
What is the purpose of a Business Impact Analysis (BIA)To identify critical business processes and the impact of their disruption
What is threat modelingA process to identify, understand, and address security threats to a system or process
Why are Key Risk Indicators (KRIs) importantThey help monitor changing risk conditions and alert management to potential issues
Why is continuous monitoring important in risk managementTo ensure that risk controls remain effective and that any new risks are identified quickly
This deck includes concepts related to risk management, threat identification, and implementing monitoring tools and techniques to analyze security risks.
Share on...
Follow us on...