Difference between cyber security risk and any other risk

Assignment Help Operation Management
Reference no: EM132116158

1. Risk is defined as ---

2. What is the difference between cyber security risk and any other risk?

3. What is risk management?

4. The goal of any risk response is achieve a balance of ______________________vs___________________

5. A loss occurs with __________________

6. Explain a 4 by 5 probability and impact matrix

7. There are three pillars(key components) in Cyber security risk ; identify each pillar and define it

8. Define what a threat is and give one example

9. Which is not a component of risk management:

Identifying risks

Assessing risks

Eliminating risks

Prioritizing risks

10. Which is not an accurate statement

A. You can reduce the impact of a threat

B. You can reduce the potential for a threat to occur

C. Threats can be eliminated

D. Threats are always present

11. Define what vulnerability is and give one source of a vulnerability

12. Identify theft is not:

Deliberate use of someone else’s identity

Fraud

Electronically altering data

Used for financial gain

13. Which is not an example of an exploit mitigation

A. Version control

B. Strong patch management

C. Policies and procedures

D. Incident response

14. There are 4 risk response options, name them

15. What is residual risk?

6. Define risk appetite

17. Define PII

18. Which is NOT a purpose of employee risk training?

They can develop a mitigation

They know how to recognize a risk

They know how to respond to a possible risk

All are purposes of a risk training program.

19. Which is NOT PII?

Driver’s license number

Computer IP address

Social Security Number

Towson ID number

20. Which is not true about compliance?

A. Compliance means you must comply with applicable laws

B. You are expected to be aware of compliance regulations and their relevance

C. Ignorance of the laws is no excuse

D. A company can determine what they must comply with

21. We discussed multiple compliance regulations, FISMA, HIPPA, GLBA, SOX, FERPA

Which is used to protect medical information? HIPPA

Which is used to protect Student Information?

T/F GLBA is a subset of FISMA that TU must comply with.

Who is required to comply with FISMA?

22. Which is not true of the NIST Cyber security Risk Management framework (CRMF)

A. Cyber security is managed at multiple organizational levels

B. Security is integrated into the system development life cycle

C. Cyber security risks are identified on a quarterly basis

D. The First stage requires a system inventory to be developed

23. Risk mitigation starts with a strong asset inventory. Give 4 pieces of information would be required in an asset inventory besides the system’s name and acronym.

24. Which factor below is not considered when determining mission criticality of a system?

A. Vital or an organization

B. If system fails the company cannot perform essential functions

C. Monetary loss

D. Legal and compliance requirements

25. Calculate the FIPS 199 system categorization for a Payroll system

26. What is the acronym (or name) of the federal organization that writes all federal cyber security and Risk Management standards, guidelines, and special publications?

27. There are three types of information, Public, Proprietary and private, which one requires the most protection?

28. What is a security control? Why would you use one?

29. Where would you find the control for the policy and procedures for the Contingency Planning (CP)) family?

30. What control family would you use if you wanted to make sure only the people that needed the information could see it?

31. What is the purpose of a system security plan?

32. Why is continuous monitoring important?

Reference no: EM132116158

Questions Cloud

Costs of quality in supply chain for food : What are the costs of quality in a supply chain for a food that is eaten raw?
Create training proposal letter for potential client : Create a training proposal letter for a potential client that explains your professional services.
Compare and contrast four methods of job evaluation : Discuss the tools and techniques to conduct procurement in project management. Compare and contrast four methods of job evaluation
Some are employed by university as teaching associates : Some are employed by the university as teaching associates (TAs); some are employed as research associates (RAs);
Difference between cyber security risk and any other risk : What is the difference between cyber security risk and any other risk? What is the purpose of a system security plan? Why is continuous monitoring important?
Data mining concepts with customer relationship management : "Data Mining Concepts with Customer Relationship Management", the framework of a customer relationship management system has four elements:
Instructional methods in your current or future position : Discuss ways that you plan to apply what you learned in this course and instructional methods in your current or future position.
Total quality management and sigma six quality programs : use business process engineering tools such as total quality management (TQM) and Sigma Six quality programs to reduce defects?
Reflects strategy of related or unrelated diversification : Given the above listing, would you say that Marriott’s business lineup reflects a strategy of related or unrelated diversification?

Reviews

Write a Review

Operation Management Questions & Answers

  Book review - the goal

Operations Management is about a book review. Title of the book is "Goal". This book has been written by Dr. Eliyahu Goldartt. The book has been appreciated by many as one of those books which offers an insight into the operations and strategic capac..

  Operational plan in hospitality enterprise

Operational plan pertaining to a hospitality enterprise is given in detail in the solution. The operational plan is an important plan or preparation which gives guidelines regarding the role and responsibilities of each and every operation at all lev..

  Managing operations and information

Recognise the importance of a strategic approach to the development and deployment of organisational information systems. Demonstrate an understanding of the importance of databases and their integration to the organisation's overall information mana..

  A make-or-buy analysis

An analysis of the holding costs, including the appropriate annual holding cost rate.

  Evolution and contributor of operations management

Briefly explain Evolution and contributor of Operations management.

  Functions and responsibilities of an operations manager

A number of drivers of change have transformed the roles, functions and responsibilities of an operations manager over recent years. These drivers have not only been based on technological innovations but also on the need for organisations to develop..

  Compute the optimal order quantity

Compute the Optimal Order quantity of DVD players. Determine the appropriate reorder point.

  Relationship to operations practice in the organisation

Evaluate problems in operations and identify approaches to overcoming them. Critically evaluate operating plans and identify areas for improvement. Justify, implement and evaluate changes to operations in line with modern approaches.

  A make or buy analysis

Develop a report for Figi Fabricating that will address the question of whether the company should continue to purchase the part from the supplier or begin to produce the part itself.

  Prepare a staffing plan

Prepare a staffing plan showing the change of your unit from medical/surgical staffing to oncology staffing.

  Leadership styles in different organizations

Ccompare the effectiveness of different leadership styles in different organizations

  Risk management tools and models

Be able to understand the concept of risk, roles and responsibilities for risk management and risk management tools and models.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd