Risk / Riesgo (IT)

studied byStudied by 1 person
0.0(0)
get a hint
hint

Risk –

1 / 9

Studying Progress

0%
New cards
10
Still learning
0
Almost done
0
Mastered
0
10 Terms
1
New cards

Risk –

The level of impact on organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals resulting from the operation of an information system given the potential impact of a threat and the likelihood of that threat occurring. The level of impact on organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation resulting from the operation of an information system given the potential impact of a threat and the likelihood of that threat occurring.

New cards
2
New cards

Risk-Adaptable Access Control – (RAdAC)

A form of access control that uses an authorization policy that takes into account operational need, risk, and heuristics.

New cards
3
New cards

Risk Analysis –

The process of identifying the risks to system security and determining the likelihood of occurrence, the resulting impact, and the additional safeguards that mitigate this impact. Part of risk management and synonymous with risk assessment. Examination of information to identify the risk to an information system. See Risk Assessment.

New cards
4
New cards

Risk Assessment Report –

The report which contains the results of performing a risk assessment or the formal output from the process of assessing risk.

New cards
5
New cards

Risk Assessor –

The individual, group, or organization responsible for conducting a risk assessment.

New cards
6
New cards

Risk Executive – (or Risk Executive Function)

An individual or group within an organization that helps to ensure that: (i) security risk-related considerations for individual information systems, to include the authorization decisions for those systems, are viewed from an organization-wide perspective with regard to the overall strategic goals and objectives of the organization in carrying out its missions and business functions; and (ii) managing risk from individual information systems is consistent across the organization, reflects organizational risk tolerance, and is considered along with other organizational risks affecting mission/business success.

New cards
7
New cards

Risk Management 1 –

The process of managing risks to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation, resulting from the operation of an information system, and includes: (i) the conduct of a risk assessment; (ii) the implementation of a risk mitigation strategy; and (iii) employment of techniques and procedures for the continuous monitoring of the security state of the information system.

New cards
8
New cards

Risk Management 2 –

The process of managing risks to organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals resulting from the operation of an information system, and includes: 1) the conduct of a risk assessment; 2) the implementation of a risk mitigation strategy; and 3) employment of techniques and procedures for the continuous monitoring of the security state of the information system.

New cards
9
New cards

Risk Management 3 –

The process of managing risks to agency operations (including mission, functions, image, or reputation), agency assets, or individuals resulting from the operation of an information system. It includes risk assessment; cost-benefit analysis; the selection, implementation, and assessment of security controls; and the formal authorization to operate the system. The process considers effectiveness, efficiency, and constraints due to laws, directives, policies, or regulations.

New cards
10
New cards

Risk Assessment –

The process of identifying risks to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation, arising through the operation of an information system. Part of risk management, incorporates threat and vulnerability analyses and considers mitigations provided by security controls planned or in place. Synonymous with risk analysis.

New cards

Explore top notes

note Note
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 93 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 24 people
Updated ... ago
5.0 Stars(4)
note Note
studied byStudied by 27 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7502 people
Updated ... ago
4.7 Stars(89)

Explore top flashcards

flashcards Flashcard35 terms
studied byStudied by 309 people
Updated ... ago
4.8 Stars(11)
flashcards Flashcard115 terms
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard30 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard31 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard30 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard44 terms
studied byStudied by 18 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard130 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard79 terms
studied byStudied by 789 people
Updated ... ago
4.3 Stars(15)