Information Security Governance - Risk assessment
7 important questions on Information Security Governance - Risk assessment
What are information assets that must be protected?
- Proprietary information and processes
- Financial records and future projects
- Acquisition or merger plans
- Strategic marketing plans
- Trade secrets
- Patent related information
- PII-data
Different asset valuation methods
- Quantitative
- Historical
- Management directives
- Environmental factors
- Business goals
- Net present value (NPV)
What is aggregated risk
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
What is cascaded risk?
Name other risk analysis approaches
What is the APT attack life cycle?
- Initial compromise
- Establish foothold
- Escalate privileges
- Internal reconnaissance
- Move laterally
- Maintain presence
- Complete mission
What are indicators of emerging threats?
- Unusual activity
- Repeated alarms
- Slow system response
- Slow network performance
- New or excessive activity in logs
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding