CompTIA Security+ (SY0-601): Risk Assessments
This section highlights key strategies in managing risk, such as transferring, accepting, and assessing residual risk. It also explains the difference between qualitative (experience-based) and quantitative (number-driven) risk analysis approaches used to evaluate and address potential threats.
Risk Transfer
A strategy that passes the risk to a third party
Rate to track your progress ✦
Key Terms
Risk Transfer
A strategy that passes the risk to a third party
Risk Acceptance
A strategy that seeks to accept the current level of risk and the costs associated with it if the risk were realized
Residual Risk
The risk remaining after trying to avoid, transfer, or mitigate the risk
Qualitative Risk
Qualitative analysis uses intuition, experience, and other methods to assign a relative value to risk
Quantitative Risk
Quantitative analysis uses numerical and monetary values to calculate risk
Quantitative...
SLE
Single Loss Expectancy:
Cost associated with the realization of each individualized thr...
ARO & ALE
Annualized Rate of Occurrence:
Number of times per year that a threat is realized
An...
Security Assessments: Active Assessments
Utilize more intrusive techniques like scanning, hands-on testing, and probing of the network to determine vulnerabiliti...
Security Assessments: Passive Assessments
Utilize open source information, the passive collection and analysis of the network data, and other unobtrusive methods ...
Security Controls
Physical Controls
Any security measures that are designed to deter or prevent unauthorized access to sensitive inform...
Security Controls: NIST Categories
Management, Operational, & Technical Controls
Management Controls
Security controls that are focused on decision-making and the management of risk
Preventative, Detective, & Corrective Controls
Preventative Controls
Security controls that are installed before an event happens and are designed to prevent someth...
Compensating Control
Used whenever you can’t meet the requirement for a normal control
Residual risk not covered by a compensating control...
Types of Risks
External Risk
Risks that are produced by a non-human source and are beyond human control
Risk Register
Every project has a plan, but also has risk
Identify/document risk associated with each step of project
Apply poss...
Risk Matrix/Heat Map
View results of risk assessment
Visually identify risk based on color
Combines likelihood of event with potential ...
Risk Appetite
Amount of risk an organization is willing to take
Related Flashcard Decks
| Term | Definition |
|---|---|
Risk Transfer | A strategy that passes the risk to a third party |
Risk Acceptance | A strategy that seeks to accept the current level of risk and the costs associated with it if the risk were realized |
Residual Risk | The risk remaining after trying to avoid, transfer, or mitigate the risk |
Qualitative Risk | Qualitative analysis uses intuition, experience, and other methods to assign a relative value to risk Experience is critical in qualitative analysis |
Quantitative Risk | Quantitative analysis uses numerical and monetary values to calculate risk Quantitative analysis can calculate a direct cost for each risk |
SLE | Single Loss Expectancy: Cost associated with the realization of each individualized threat that occurs |
ARO & ALE | Annualized Rate of Occurrence: Annualized Loss Expectancy: |
Security Assessments: Active Assessments | Utilize more intrusive techniques like scanning, hands-on testing, and probing of the network to determine vulnerabilities |
Security Assessments: Passive Assessments | Utilize open source information, the passive collection and analysis of the network data, and other unobtrusive methods without making direct contact with the targeted systems Passive techniques are limited in the amount of detail they find |
Security Controls | Physical Controls Technical Controls Administrative Controls |
Security Controls: NIST Categories Management, Operational, & Technical Controls | Management Controls Operational Controls Technical Controls |
Preventative, Detective, & Corrective Controls | Preventative Controls Detective Controls Corrective Controls |
Compensating Control | Used whenever you can’t meet the requirement for a normal control |
Types of Risks | External Risk Internal Risk Legacy Systems Multiparty IP Theft Software Compliance/Licensing |
Risk Register | Every project has a plan, but also has risk |
Risk Matrix/Heat Map | View results of risk assessment |
Risk Appetite | Amount of risk an organization is willing to take |