d. Risk correction
6. The amount of risk an organization can handle should be based on which of the following?
a. Technological level
b. Acceptable level
c. Affordable level
d. Measurable level
7. Which of the following methods for handling a risk involves a third party?
a. Accept risk
b. Share risk
c. Reduce risk
d. Transfer risk
8. Which of the following security risk assessment techniques uses a group of experts as the basis for making decisions or judgments?
a. Risk assessment audits
b. Delphi method
c. Expert systems
d. Scenario-based threats
Risk assessment audits are incorrect because these audits do not provide the same consensus as the one reached by a group of experts available in the Delphi method. Usually, one or two individuals perform audits, not groups. Expert system is incorrect because it is a computer-based systems developed with the knowledge of human experts. These systems do not reach a consensus as a group of people. Scenario-based threats are incorrect because possible threats are identified based on scenarios by a group of people. However, this system does not have the same consensus reached as in the Delphi method. The process of submitting results and comments make the Delphi method more useful than the other methods.
9. The costs and benefits of security techniques should be measured in monetary terms where possible. Which of the following is the most effective means to measure the cost of addressing relatively frequent threats?
a. Single-occurrence losses
b. Annual loss expectancy
c. Fatal losses
d. Catastrophic losses
A single-occurrence loss (SOL) is incorrect because it is the loss expected to result from a single occurrence of a threat. It is determined for a given threat by first calculating the product of the loss potential and vulnerability factor for each function and asset for the threat analyzed. Then the products are summed to generate the SOL for the threat. Because the SOL does not depend on an estimate of the threat’s occurrence rate, it is particularly useful for evaluating rare but damaging threats. If a threat’s SOL estimate is unacceptably high, it is prudent risk management to take security actions to reduce the SOL to an acceptable level.
Both fatal losses and catastrophic losses are big and rare. Fatal losses involve loss of human life and catastrophic loss incurs great financial loss. In short, ALE is useful for addressing relatively frequent threats whereas SOL and fatal or catastrophic losses address rare threats.
Sources and References
“Directions in Security Metrics Research (NISTIR 7564),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, April 2009.