Risk Management Principles
Risk Context
Risk Evaluation
Risk Identification
Risk Treatment
100

A security control that is inherited by one or more organizational information systems

Common control

100

The approach used to assess risk and its contributing risk factors

Assessment approach

100

Maintaining ongoing awareness to support organizational risk decisions

Continuous Monitoring

100

A cyberattack where threat actors make machines and other network resources unavailable to their intended users

Denial of Service (DoS) attack

100

A time-phased or situation dependent combination of risk response measures

Course of Action

200

The potential of harm to organizational operations due to the potential for unauthorized access, use, disclosure, disruption, modification, or destruction of information and/or information systems.

Information security risk

200

All components of an information system to be authorized for operation by an authorizing official

Authorization boundary

200

Any observable occurrence in a network or system

Event

200

What are the two main aspects of risk

Likelihood and Impact

200

The neutralization or elimination of a vulnerability or the likelihood of its exploitation

Remediation

300

The portion of risk remaining after security measures have been applied

Residual Risk

300

A risk management process for determining the level of security required for information or an information system.

Security categorization

300

The measure of importance assigned to information by its owner for the purpose of denoting its need for protection

Sensistivity

300

What are the three preliminary aspects of risk identification which have to be identified first before risk can be determined?

Assets, Threats, Vulnerabilities

300

What acronym do you use to remember the four risk treatment options

MATA as in the phrase (What is the matter (only pronounced MATA)

Mitigate, Accept, Transfer/Share, Avoid

400

The individual, group, or organization responsible for conducting a risk assessment

Risk assessor

400

The characterization of information based on an assessment of the potential impact that a loss of CIA would have on the organization.

Security category

400

Any circumstance or event with the potential to adversely impact organizational operations

Threat

400

Which role is in the best position to identify risks to information or information systems

Asset owner and/or data owner

400

What document requires additional information is the risk treatment option is to ACCEPT?

Risk Register 

The rationale has to be document by the risk owner for the ACCEPT decision.

500

A structured approach used to oversee and manage risk for an enterprise

Risk Management Framework (RMF)

500

A formal document that provides an overview of the security requirements for an information system and describes the security controls in place or planned

Security Plan

500

Weakness in an information system, system security procedure, internal control or implementation

Vulnerability

500

When identifying risks, should the risk to people be considered? (Y/N)

Yes, people are assets

500

Which treatment option transfers a portion of the risk to a third party?

Sharing

M
e
n
u