CompTIA Security+ (SY0-601): Risk Assessments
This section highlights key strategies in managing risk, such as transferring, accepting, and assessing residual risk. It also explains the difference between qualitative (experience-based) and quantitative (number-driven) risk analysis approaches used to evaluate and address potential threats.
Risk Transfer
A strategy that passes the risk to a third party
Key Terms
Risk Transfer
A strategy that passes the risk to a third party
Risk Acceptance
A strategy that seeks to accept the current level of risk and the costs associated with it if the risk were realized
Residual Risk
The risk remaining after trying to avoid, transfer, or mitigate the risk
Qualitative Risk
Qualitative analysis uses intuition, experience, and other methods to assign a relative value to risk
Experience is ...
Quantitative Risk
Quantitative analysis uses numerical and monetary values to calculate risk
Quantitative analysis can calculate a dir...
SLE
Single Loss Expectancy:
Cost associated with the realization of each individualized threat ...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
Risk Transfer | A strategy that passes the risk to a third party |
Risk Acceptance | A strategy that seeks to accept the current level of risk and the costs associated with it if the risk were realized |
Residual Risk | The risk remaining after trying to avoid, transfer, or mitigate the risk |
Qualitative Risk | Qualitative analysis uses intuition, experience, and other methods to assign a relative value to risk Experience is critical in qualitative analysis |
Quantitative Risk | Quantitative analysis uses numerical and monetary values to calculate risk Quantitative analysis can calculate a direct cost for each risk |
SLE | Single Loss Expectancy: Cost associated with the realization of each individualized threat that occurs |
ARO & ALE | Annualized Rate of Occurrence: Annualized Loss Expectancy: |
Security Assessments: Active Assessments | Utilize more intrusive techniques like scanning, hands-on testing, and probing of the network to determine vulnerabilities |
Security Assessments: Passive Assessments | Utilize open source information, the passive collection and analysis of the network data, and other unobtrusive methods without making direct contact with the targeted systems Passive techniques are limited in the amount of detail they find |
Security Controls | Physical Controls Technical Controls Administrative Controls |
Security Controls: NIST Categories Management, Operational, & Technical Controls | Management Controls Operational Controls Technical Controls |
Preventative, Detective, & Corrective Controls | Preventative Controls Detective Controls Corrective Controls |
Compensating Control | Used whenever you can’t meet the requirement for a normal control |
Types of Risks | External Risk Internal Risk Legacy Systems Multiparty IP Theft Software Compliance/Licensing |
Risk Register | Every project has a plan, but also has risk |
Risk Matrix/Heat Map | View results of risk assessment |
Risk Appetite | Amount of risk an organization is willing to take |