Information Security Governance - Risk assessment

7 important questions on Information Security Governance - Risk assessment


What are information assets that must be protected?

  • Proprietary information and processes
  • Financial records and future projects
  • Acquisition or merger plans
  • Strategic marketing plans
  • Trade secrets
  • Patent related information
  • PII-data

Different asset valuation methods

  • Quantitative
  • Historical
  • Management directives
  • Environmental factors
  • Business goals
  • Net present value (NPV)

What is aggregated risk

Minor vulnerabilities that in combination could have significant impact.
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart

What is cascaded risk?

A result of one failure leading to a chain of failures

Name other risk analysis approaches

Value at RIS (VAR) - statistical probablilities

What is the APT attack life cycle?

  • Initial compromise
  • Establish foothold
  • Escalate privileges
  • Internal reconnaissance
  • Move laterally
  • Maintain presence
  • Complete mission

What are indicators of emerging threats?

  • Unusual activity
  • Repeated alarms
  • Slow system response
  • Slow network performance
  • New or excessive activity in logs

The question on the page originate from the summary of the following study material:

  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
Remember faster, study better. Scientifically proven.
Trustpilot Logo