Cism Exam Preparation
Cism Exam Preparation
PREPARATION
Domain 4: Domain 1:
Information Security Information Security
Incident Governance, 24%
Management, 19%
Domain 3:
Information Security
Domain 2:
Program
Information Security
Development and
Risk Management,
Management, 27%
30%
Risk Identification
K2.6 Legal, regulatory, organizational and other requirements may influence risk
treatment decisions.
K2.7 Because the risk environment changes often, reliable and timely sources are
needed for effective risk management.
K2.8 A working knowledge of threats, vulnerability and exposure guides risk
treatment decisions as circumstances change over time.
K2.16 Optimal risk treatment may require substantial planning to move from the
current state to the desired state.
Probability The extent to which an event is likely to occur, measured by the ratio of
the favorable cases to the whole number of cases possible
Risk analysis The initial steps of risk management: analyzing the value of assets to the
business, identifying threats to those assets and evaluating how vulnerable
each asset is to those threats.
Risk management The coordinated activities to direct and control an enterprise with regard
to risk
Risk tolerance The acceptable level of variation that management is willing to allow for
any particular risk as the enterprise pursues its objectives
Threat Anything (e.g., object, substance, human) that is capable of acting against
an asset in a manner that can result in harm.
Vulnerability A weakness in the design, implementation, operation or internal control of
a process that could expose the system to adverse threats from threat
events
Identification
Analysis
Evaluation
Risk treatment
In order to protect
something, you need to
identify it.
Essential to managing risk
at an enterprise level
Systems and data are
considered information
assets
Low
23 ©Copyright 2016 ISACA. All rights reserved.
Discussion Question
Data Disease
Criminal acts Espionage
corruption (epidemics)
Hardware
Facility flaws Fire Flooding
flaws
Power
Industrial Mechanical
Lost assets surge/utility
accidents failures
failure
Seismic Software
Sabotage Severe storms
activity errors
Supply chain
Terrorism Theft
interruption
Intentional
– Malicious
– Often disgruntled employees
– Control: Understand
frustrations/complaints and seek
to resolve them
– Control: Enforce SoD and least
privilege
Unintentional
– Doing something they don’t
realize is a threat
– Providing information via social
engineering
– Control: Awareness training and
regular reviews
Network vulnerabilities
Physical access
Utilities
Supply chain
Processes
Equipment
Cloud computing
Internet of Things
Risk = Threats ×
Vulnerabilities ×
Consequences
Exposure: The potential loss
to an area due to the
occurrence of an adverse
event.
HIGH = 5
Threat event
LOW = 1
Threat
MEDIUM-HIGH = 4
4 × 5 = 20 4×1=4
MEDIUM-HIGH LOW
Practice Questions
K2.13 There are four ways to address risk, and it’s essential to know which approach
to use when, and why, because choosing the wrong treatment may lead to
excessive cost, fail to manage risk to tolerable levels or both.
K2.14 Controls are mechanisms used to mitigate, and it may be more cost effective to
employ known approaches rather than “reinventing the wheel.”
K2.6 Legal, regulatory, organizational and other requirements may influence risk
treatment decisions.
K2.7 Because the risk environment changes often, reliable and timely sources are
needed for effective risk management.
K2.8 A working knowledge of threats, vulnerability and exposure guides risk
treatment decisions as circumstances change over time.
K2.16 Optimal risk treatment require substantial planning to move from the current
state to a desired state.
K2.17 Risk management is most effective when it is built into business processes.
Risk acceptance If the risk is within the enterprise's risk tolerance or if the cost of
otherwise mitigating the risk is higher than the potential loss, the
enterprise can assume the risk and absorb any losses
Risk avoidance The process for systematically avoiding risk, constituting one approach to
managing risk
Risk mitigation The management of risk through the use of countermeasures and controls
Risk transfer The process of assigning risk to another enterprise, usually through the
purchase of an insurance policy or by outsourcing the service
Risk treatment The process of selection and implementation of measures to modify risk
(ISO/IEC Guide 73:2002)
Qualitative analysis:
– Based on category assignment (Low, Medium, High)
– Scales can be adjusted to suit circumstances
– Can be used:
• As an initial assessment
• To consider nontangible aspects of risk
• When there is a lack of adequate information
Quantitative analysis
– Assigned numerical values
• Based on statistical probabilities and monetary values
– Quality depends on accuracy and validity
– Consequences may be expressed in terms of:
• Monetary Technical
• Operational
• Human impact criteria
Semiquantitative analysis
Bayesian analysis
Bow tie analysis
Delphi method
Event tree analysis
Fault tree analysis
Markov analysis
Monte-Carlo analysis
TX
75 ©Copyright 2016 ISACA. All rights reserved.
Good To Know
Practice Questions
A. Cost-benefit analysis
B. Penetration testing
C. Frequent risk assessment programs
D. Annual loss expectancy calculation
A. an intrinsic risk.
B. a systemic risk.
C. a residual risk.
D. an operational risk.
K2.13 There are four ways to address risk, and it’s essential to know which approach
to use when, and why, because choosing the wrong treatment may lead to
excessive cost, fail to manage risk to tolerable levels, or both.
K2.17 Risk management is most effective when it is built into business processes.
K2.18 Timelines and content of risk reports are often driven by explicit compliance
standards.
Key risk indicator A subset of risk indicators that are highly relevant and possess a high probability of
predicting or indicating important risk.
Maximum allowable The absolute longest amount of time that the system can be unavailable without
downtown direct or indirect ramifications to the organization.
Maximum tolerable Maximum time that an enterprise can support processing in alternate mode.
outage
Service delivery Directly related to the business needs, SDO is the level of services to be reached
objective during the alternate process mode until the normal situation is restored.
Recovery point Determined based on the acceptable data loss in case of a disruption of operations. It
objective indicates the earliest point in time that is acceptable to recover the data. The RPO
effectively quantifies the permissible amount of data loss in case of interruption.
Recovery time objective The amount of time allowed for the recovery of a business function or resource after
a disaster occurs.
Impact
Effort
– To implement
– To measure
– To report
Reliability
Sensitivity
Reports should be
tailored to the intended
audience
Use categories like
“HIGH,” “MEDIUM,”
“LOW.”
Use data to back up
rationale.
The information security
manager is responsible
for information risk.
109 ©Copyright 2016 ISACA. All rights reserved.
Escalation
Practice Questions
Summary