Which action involves shifting the consequence of a risk and responsibility for its management to a third party?

Identifying risks is a subprocess of the _____ process of project risk management.

planning

Risk utility rises at a decreasing rate for a _____ person.

risk-adverse

The _____ lists the relative probability of a risk occurring and the relative impact of the risk occurring.

probability/impact matrix

The main outputs of which process include a risk register, risk report, and project documents updates?

identifying risks

Those who are _____ have a higher tolerance for risk, and their satisfaction increases when more payoff is at stake.

risk-seeking

Unenforceable conditions or contract clauses and adversarial relations are risk conditions associated with the project _____ management knowledge area.

procurement

What is the first step in a Monte Carlo analysis?

Collect the most likely, optimistic, and pessimistic estimates for the variables in the model.

What process involves deciding how to approach and plan the risk management activities for the project?

planning risk management

Which action involves eliminating a specific threat, usually by eliminating its causes?

risk avoidance

Which action involves reducing the impact of a risk event by reducing the probability of its occurrence?

risk mitigation

Which action applies to positive risks when the project team cannot or chooses not to take any actions toward a risk?

risk acceptance

Which action involves allocating ownership of the risk to another party?

risk sharing

Which action involves changing the size of the opportunity by identifying and maximizing key drivers of the positive risk?

risk enhancement

Which action involves doing whatever you can to make sure the positive risk happens?

risk exploitation

Which action involves shifting the consequence of a risk and responsibility for its management to a third party?

risk transference

Which analysis technique simulates a model’s outcome many times to provide a statistical distribution of the calculated results?

Monte Carlo

Which diagramming technique is used to help select the best course of action in situations in which future outcomes are uncertain?

decision tree

Which document contains results of various risk management processes; it is often displayed in a table or spreadsheet format?

risk register

Which is a fact-finding technique that can be used for collecting information in face-to-face, phone, e-mail, or instant-messaging discussions?

interviewing

Which process involves determining what risks are likely to affect a project and documenting the characteristics of each?

identifying risks

Which process involves monitoring identified and residual risks, identifying new risks, carrying out risk response plans, and evaluating the effectiveness of risk strategies throughout the life of the project?

monitoring risk

Which process involves numerically estimating the effects of risks on project objectives?

performing quantitative risk analysis

Which process involves prioritizing risks based on their probability of occurrence and impact?

performing qualitative risk analysis

Which process involves taking steps to enhance opportunities and reduce threats to meeting project objectives?

planning risk responses

___ involves shifting the consequence of a risk and responsibility for its management to a third party.

___ involves shifting the consequence of a risk and responsibility for its management to a third party.

a. Risk avoidance
b. Risk acceptance
c. Risk transference
d. Risk mitigation

Answer: Risk transference

Learn More :

Emergency Response and Recovery

Susan Snedaker, Chris Rima, in Business Continuity and Disaster Recovery Planning for IT Professionals (Second Edition), 2014

Insurance

As we’ve discussed, insurance is a risk transference method and one used by many, if not all, businesses today. In some cases, your firm may be required to hold certain types of insurance; in other cases, it may be voluntary. Your BC/DR plan should have contact information for your insurance company representatives, and they should be notified upon activation of the CMT. The CMT may also perform an initial damage assessment and document it for the insurance company. This might include taking photographs or video images as well as making detailed notes. Members of the CMT team should also begin gathering documents related to insurance claims and submit loss estimates to the insurance company. Finally, someone on the CMT should review the insurance documents to determine exclusions, limitations (financial, time, location, cause, etc.), or maximums on various policies. Any issues with insurance should be escalated to management and/or legal counsel for review and resolution.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124105263000088

Risk Mitigation Strategy Development

Susan Snedaker, Chris Rima, in Business Continuity and Disaster Recovery Planning for IT Professionals (Second Edition), 2014

Risk transference

Risk transference involves handing the risk off to a willing third party. Many companies outsource certain operations such as customer service, order fulfillment, or payroll services. They do this in many cases, so they can focus on their core competencies, but they can also do this as part of risk management. For example, if you outsource your payroll services, you may choose to select a processing company that is not located in the same geographical region as your firm. If you’re in the southeastern United States, you may choose a company in the Northwest or one that has multiple processing sites around the United States, so it can process payroll regardless of weather events.

Another example of risk transference is purchasing insurance or other insurance types of services. In order to transfer risk, you usually have to pay some other company some amount of money to assume that risk, whether it’s an IT company that will manage your security or databases for you, or an insurance company that will pay for losses in the event of a business disruption. Figure 6.3 shows that, relative to other choices, your risk transference will usually cost more as some sort of up-front or ongoing fee, but that the overall cost usually will be somewhere in the same area as risk limitation. One important point to note, however, is that risk limitation usually has an end-point cost where risk transference can be ongoing. For example, you make insurance premium payments every month or quarter, regardless of whether or not you experience an event that requires your insurance company to step in. With risk limitation, you typically put some system in place, such as a firewall or redundant system. The cost of that implementation is finite and known and usually ends at some point in time. Of course, you then have to incur the cost of patching, maintaining, upgrading, and replacing that firewall over time, and those are ongoing costs that are sometimes omitted from the overall cost/benefit analysis. Even when those costs are included and even if they net out to the same cost as insurance, your firm may conclude that it’s a more beneficial to purchase the gear and manage it than simply buy insurance. One reason is that usually there are other benefits to having the gear (in this example) that enhance business operations. Another reason is that even if the cost nets out the same, insurance doesn’t address the risk in any manner, just the cost.

In the case of contracting with an external payroll processing firm that has multiple geographic processing centers, risk limitation makes sense and does, in fact, limit your exposure. Where it can become a bit convoluted is assessing what additional risks you’re taking on by outsourcing your payroll function. You can’t simply outsource and expect that your problems are solved.

Thus, while the near-term costs of risk limitation and risk transference may appear to be similar, it’s important to understand the duration of the cost with regard to these strategies and the operational implications of each. It’s also important to assess any new or residual risk that has developed as a result of these decisions.

Real World

Operationalizing BC/DR

Some companies don’t like to discuss risk either because they don’t want to acknowledge it or because they are cavalier about the risks they face. This latter stance is most commonly found in small, entrepreneurial start-ups that have their hands full just getting the business off the ground. Often the larger a company gets, the more it is willing to discuss, plan for, and mitigate various kinds of risks. This may be, in part, due to outside pressures of regulatory compliance, financial markets, or investors. If you’re working in a small company that doesn’t want to address risk, you may run into challenges even getting a BC/DR plan off the ground. As we discussed earlier in the book, you may be able to implement many of the BC/DR plan elements without making a big, formal process out of it. If this is the only way you can do BC/DR planning, it may be worth working in stealth mode. For example, when you look at data backup methods, you may choose to select and implement technologies and processes that not only meet your backup needs but provide an adequate level of BC/DR capabilities as well. You should certainly follow the rules, regulations, and procedures in your company, but you may find that you have a bit of leeway when it comes to implementing technology solutions that will meet the broader needs of the company, even if the company doesn’t want to know about it.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124105263000064

RIoT Control

Tyson Macaulay, in RIoT Control, 2017

Internal Policy

Internal policy is about the management-level guidance especially given to product management and engineering about the security and privacy controls appropriate for the IoT good or service, and how it is derived. Is it based on international standards or industry best practice? Is it about regulation or self-regulation?

The importance of internal policy lies in the fact that complexity is manageable, but not necessarily managed. That is, the complexity of the IoT system can get beyond management abilities, and the risk is that many vulnerabilities and threats are not addressed, or are ignored or unknown.

Internal skills and understanding must be developed to establish an appropriate internal security policy. Weak policy at the top equals weak security throughout. This might also become a major risk for IoT goods and service providers related to liability.

This notion of the importance of internal policy and internal governance is demonstrated as countries like the United States seek to enforce a degree of internal competence, at least for publicly listed companies.

Recent bills before the US government show the merit of this type of approach, for instance the Cybersecurity Information Sharing Act of 2015/2016,21 which seeks to compel an awareness of the importance of internal security, policy, and governance.

This might make a difference: forced disclosure of board-level awareness and abilities related to cyber security. It is not expensive or time consuming like audit. And fakery should be easy to detect and challenged as a shareholder (read the Board members’ CVs and decide for yourself if there is anyone on the board who knows enough about security). However, this can generate some ridiculous outcomes, too: boards members claiming to be cybersecurity experts because they once installed desktop AV on their home computer, in 1998, for instance.

While a board-level executive with a bono fide understanding of cyber security will go a long way toward managing risks associated with internal policy, his/her judgement will only be as good as the information have available; for instance, about security posture of the organization and about the supply chain. But, at least at the board level, there will now be a capability to ask questions and get diligently composed answers about security and risk management, due to regulation.

What questions should a board-level representative be asking to manage IoT risks associated with internal policy? As a starting point, a board might ask for information about the four main IoT security control points: endpoint, gateway, network, and DC/clouds.

These questions might be posed in a matrix format, looking for summary information about the main operational requirements we have identified, as shown in the example in Table 13.2.

Table 13.2. Board Member IoT Security Due Diligence Question Matrix

Board member question: what security controls do we have in place or are we planning in each of the cells of this table?
EndpointGatewayNetworkCloud/DC
Safety
Confidentiality and integrity
Availability and resilience
Identity and access control
Context and the environment
Interoperability and flexibility

Additionally, the following questions might be posed:

What security controls are transferred or outsourced to suppliers along with certain services? What are the SLAs associated with this risk transference?

What risks are being accepted? For legitimate (or not) reasons such as cost?

Other areas that will make internal policy an area of risk and complexity will be whether internal policy can be flexible enough to deal with, and how does it address:

Administrative errors and omissions

Cascading failures from one system to another or one part of the supply chain to another. These are very difficult to assess because they are frequently unimagined until an event comes to pass.22

Unintended and unforeseen user behaviors associated with:

Defective or emergent behaviors (see out discussion in Chapter 12, Threats and Impacts to the IoT, on emergent behavior).

The human-machine interface and unforeseen loads and conditions resulting from conditions of panic, frustration, impatience, sloth, negligence, and all the other deadly sins.

Internal policy cannot just be something merely mandated with the wave of an executive hand. It requires a strategic alignment between the business requirements and operational requirements. Management or board-level executives need to understand IoT security beyond just how to spell it. This also means that IoT security has to be meaningful to the business in fundamentally two ways, as we have been repeating through this book:

Internal policies about IoT security add value to goods and services and ultimately make more satisfied customers

Internal policies about IoT security generate efficiencies and save money compared to insecure systems; for instance, through less downtime, faster recovery, fewer defects

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124199712000133

Business Impact Analysis

Susan Snedaker, Chris Rima, in Business Continuity and Disaster Recovery Planning for IT Professionals (Second Edition), 2014

Upstream and downstream losses

In addition to the direct impact of a business disruption such as an earthquake or flood, there are indirect impacts you should consider. These can be viewed as upstream and downstream losses. Upstream losses are those you will suffer if one of your key suppliers is affected by a disaster. If your company relies on regular deliveries of products or services by another company, you could experience upstream losses if that company cannot deliver. If you run a manufacturing company that relies on raw materials arriving on a set or regular schedule, any disruption to that schedule will impact your company’s ability to make and sell its products. This is how a disaster elsewhere can impact you, even if your company is unharmed. Downstream losses occur when key customers or the lives in your community are affected. If your business supplies parts to a major manufacturer that is shut down due to a hurricane or earthquake, your sales will certainly suffer. Similarly, if your company provides any type of noncritical service to your community and there is a flood or landslide, your sales could take a hit while residents of the community deal with the disaster. If you operate a chain of restaurants or movie theaters or golf courses, residents will be more focused on dealing with the disaster than on entertainment and leisure pursuits. These are considered downstream losses even if your business, itself, has not taken the direct impact of a disaster.

Keep in mind, too, that people, businesses, and communities are interrelated; very few (if any) companies exist in isolation. A natural disaster or serious disruption can create a chain reaction that ripples through the business community and impacts the local or regional economy.

Real World

Protecting Your Assets

BC/DR planning can certainly help you mitigate some of your risks. In Chapter 6, we’ll develop specific strategies for doing so. However, keep in mind that various types of insurance can help as well. This is considered risk transference and is a well-accepted business practice. If you’re a small company, have the owner or general manager consider looking into purchasing business income interruption and extra expense insurance. If a business disruption occurs, there could be both an immediate and long-term impact on your company’s revenues. Not only will it not be business-as-usual, you’ll have the added expenses of lost productivity, lost customers, and higher costs. Some of your out-of-pocket expenses might ultimately be covered by insurance, such as the loss of equipment from a storm or building collapse. Other expenses, however, won’t be covered. When revenues decrease and expenses increase, it can create a devastating financial picture for your company. Some basic business insurance policies cover expenses and loss of net business income, but it may not cover business interruptions that occur away from your business, such as to your key supplier, vendor, customer, or even your utility company. This type of insurance can typically be purchased as additional coverage to an existing policy. We’re not suggesting you purchase additional insurance (and we have no connections to the insurance industry), but we do suggest you, your financial folks or your general manager (CEO, founder, and owner) look at your financial exposure and your current insurance policy and decide if you’re properly protected. Of course, insurance alone will not protect your business from failing in the face of a serious disruption or event—that’s where a solid BC/DR plan comes in.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124105263000052

Plan of Action and Milestones

Stephen D. Gantz, Daniel R. Philpott, in FISMA and the Risk Management Framework, 2013

Risk Responses

Risk assessments for identified weaknesses may be formal or informal, and are conducted as needed to help system owners and common control providers characterize risk and determine what response to that risk is most appropriate [22]. It is not necessary to conduct a full risk assessment for every weakness, but in order to select the appropriate responses to risk, system owners, authorizing officials, and organizations need to have a good understanding of the nature and magnitude of the risk. Risk assessments can provide this perspective. System owners generally receive initial information regarding the significance of identified weaknesses in the contents of the security assessment report, but this information may or may not be sufficient to enable a decision about corrective actions that should be taken. Appropriate responses to risk may be determined by the system owner, alone or in consultation with others, but the response chosen is often subject to review and approval by the authorizing official or other personnel with information security management responsibility.

Responses to risk generally fall into five distinct categories: accept, avoid, mitigate, share, or transfer the risk [28]. Choices to mitigate, share, or transfer risk all involve some action that serves to reduce risk faced by the organization, the specifics of which can and should be captured in the plan of action and milestones. Risk mitigation includes any actions undertaken by the organization to bring risk down to a level that falls within the organizational tolerance. Sharing and transferring risk are choices that do nothing to change the magnitude, likelihood, or impact of risk, but shift some or all of the liability associated with the risk to another party. NIST distinguishes between risk sharing and risk transference in that sharing shifts only part of the liability, while transference shifts responsibility for the entire liability to another organization [29]. Both acceptance and avoidance mean that no corrective action will be taken to address the risk in question, but these two responses have very different implications for an information system. A decision to accept represents a risk-based determination that the organization is willing to expose whatever vulnerability the weakness or deficiency entails. In contrast, a decision to avoid risk is an acknowledgment by the organization that the risk is too high to be reduced, and that the organization will instead choose not to operate the system (or to operate the system with reduced capabilities that might make the deficient controls irrelevant) rather than exposing itself to risk.

Note

The goal of information security is not to mitigate all risk, but to bring risk to a level acceptable to the organization. A decision to authorize a system to operate is a decision to accept the residual risk that remains even after all appropriate security controls are implemented [2], and is a tacit acknowledgment that risk cannot be completely eliminated. The identification of a weakness in information security controls is not an obligation to correct the weakness, unless corrective action is found to be warranted based on organizationally determined criteria. System owners should also consider what risk is posed by vulnerabilities or other weaknesses discovered through automated scanning processes, to evaluate whether a viable threat-source exists that could exploit the vulnerability. For example, many Web-based applications are vulnerable to cross-site scripting or other attacks that exploit poor input validation; the technical mitigation for such vulnerabilities is to code or configure them in such as way that all input is properly validated [30]. System owners running a Web-based application accessible only to internal agency users—such as one available on an agency intranet—may not face the same threats as they would if the applications were publicly available over the Internet, so they may be less willing to incur the costs to fix input validation weaknesses. Many organizations impose a substantial burden on system owners to provide detailed justifications in order to accept risk, providing an incentive to avoid risk-accepting decisions based on administrative requirements rather than actual risk factors. It is both reasonable and expected that some weaknesses will not be corrected, and as long as decisions to accept risk are based on sound analysis, system owners should not be reluctant to make those decisions.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597496414000126

Information Gathering

Craig Wright, in The IT Regulatory and Standards Compliance Handbook, 2008

How to Characterize Your Organization

All organizations react differently and have a diverse range of levels in their sensitivity to risk. The security policy adopted by the organization needs to replicate the individual sensitivity to a variety of classes of security incidents. It should then prioritize security investments based on the sensitivity going from the highest to lowest.

There are a couple key factors that determine an organization's level of sensitivity:

1

The consequences of a security incident. Nearly all organizations are sensitive to cost. As a security incident can cause a significant increase in costs through the recovery and restoration of services (even if no critical services are affected) there is an effect. Risk transference (including insurance, policy and contractual terms and conditions) is commonly used in an attempt to ensure that cost exposure does not alter the business financial bottom-line.

2

There are also political and other organizational sensitivities to consider. Some organizational cultures are derived top down from senior level management who believe any negative press (such as that which highlights a systems compromise) is a major disaster. They often feel this whether or not the incident results in any significant cost. Organizations with an open environment (e.g. universities and scientific research communities) commonly have a culture that believes an intermittent incident is better than restricting the flow of information or external access. When considering the organizations sensitivity to security related incidents, these factors need to be determined.

A critical step in the process of determining the consequences to the organization is the completion of an information asset inventory. This is discussed in more detail in other chapters of the book. Maintaining an accurate inventory of what systems, networks, computers, and databases are presently being used is not as simple as it first seems. The combination of an inventory collation exercise while producing a classification of the data can be cost effective. In this, the location of where the information is stored on-line is classified by its significance against the business goals or mission statement.

In the event that the organization's internal functions are disrupted, serious consequences can transpire. The cost a breach can be large and may consist of a combination of factors such as:

Missed opportunities

Staff down time

Data recovery and restoration

Damage to data Integrity

Breaches of privacy

An impact to an organization's external functions can have the largest effect. This includes:

Interrupted product delivery

Incorrect receipt of customer orders (e.g., theft or fraud and loss of market confidence)

These consequences of a security incident have a direct financial impact on most organizations. The disruption of services or possible impact due to the loss of trust held by their customer base has resulted in the collapse of many previously thriving organizations.

Steps in Characterization

To characterize your organization's network, it is necessary to;

1

Identify the access points into the network (i.e. gateways, remote access etc);

2

Determine growth and future business needs;

3

Make allowances for legacy systems which may affect the security design;

4

Allow for business constraints (i.e. cost, legal requirements, existing access needs etc);

5

Identify the Threats and Visibility of the organization.

To correctly characterize an organization, it is essential to look at both the technological needs and the business needs of that organization. To do this there are a number of steps that need to be completed in each of the technological and administrative fields of review.

Administrative Steps

Administrative processes impact operational issues and as such need to be noted. In particular, areas such as policies and processes form the foundation of much audit work. Some the areas to consider when analyzing administrative controls on organization include:

1

Determine the organizations (Business) Goals

2

Determine the organizations structure

3

Determine the organizations geographical layout

4

Determine current and future staffing requirements

5

Determine the organizations existing policies and politics

Technical Steps

It is rare to find an application or system that acts in isolation. Consequently it is necessary to consider more than just the primary application. By this it is meant that you also need to investigate how the application interacts with other systems. Some of the stages to do this include:

1

Identify Applications

2

Map information flow requirements

3

Determine the organizations data sharing requirements

4

Determine the organizations network and server traffic access and access requirements

Stages of Characterization

In characterizing an organization there are a number of stages and that will quickly help you determine the risk stance taken. This means looking at the various applications and protocols deployed within the organization. For instance, have internal firewalls been deployed? Does centralized antivirus exist within the organization? The stages of characterization are generally conducted in an opposing order to a review. Rather than starting with policy this type of characterization starts with applications and works to see how well these fulfill the organization's vision. The stages are:

1

Applications

2

Network protocols

3

Document the existing network

4

Identify access points

5

Identify business constraints

6

Identify existing Policy and procedures

7

Review existing network security measures

8

Summarize the existing security state of the organization

This information is vital to enable the auditor to be able to understand an organization's requirements:

The need to be able to do to conduct your business,

What should the system's security to set to permit, deny, and log, and

From where and by whom.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597492669000059

Assessing Risk and Vulnerabilities

Lawrence J. Fennelly CPOI, CSSI, CHL-III, CSSP-1, Marianna A. Perry M.S., CPP, CSSP-1, in Physical Security: 150 Things You Should Know (Second Edition), 2017

78 Five Techniques to Deal With Identified Risks

1.

Risk Avoidance: This is the process by which you reduce the risk exposure by avoiding or eliminating the activities.

2.

Risk Loss Reduction: This is reducing the risk by reducing the maximum amount of probable loss; utilizing other venues, personnel, equipment, etc., for the activity.

3.

Risk acceptance: This is accepting the risk as it cannot be cost effectively reduced. However, all necessary attempts should be taken to monitor any increases in risk exposure to a preestablished level. Once that level is reached, there will be no other option but total removal of the personnel at risk.

4.

Risk Transference: This is the use of contracts, insurance, disclaimers, and/or releases of claims to transfer the liability for the expected loss to other parties involved.

5.

Risk Spreading: This is simply spreading the largest amount of risk over a larger part of the organization or activity by manipulating the sequence or size of the events or activities.

Insurance

This is the transfer of risk from one party to another in which the insurer is obligated to indemnify the insured for an economic loss caused by an unexpected event during a period of time covered by such insurance. Types of insurance vary from liability to crime/theft losses and fire. Rates are governed based on the frequency of claims and cost of each claim.

Risk Mitigation Strategies

Risk avoidance

Removal

Risk reduction

Decrease potential

Risk spreading

Spread the risk

Risk transfer

Insurance

Risk acceptance

Acceptance

Risk Avoidance

Risk is avoided when the organization refuses to accept it. The exposure is not permitted to come into existence. This is accomplished by simply not engaging in the action that gives rise to risk. If you do not want to risk losing your savings in a hazardous venture, then pick one where there is less risk. If you want to avoid the risks associated with the ownership of property, the do not purchase property but lease or rent instead. If the use of a particular product is hazardous, then do not manufacture or sell it. This is a negative rather than a positive technique. It is sometimes an unsatisfactory approach to dealing with many risks. If risk avoidance were used extensively, the business would be deprived of many opportunities for profit and probably would not be able to achieve its objectives.

Risk Reduction

Risk can be reduced in 2 ways—through loss prevention and control. Examples of risk reduction are medical care, fire departments, night security guards, sprinkler systems, burglar alarms—attempts to deal with risk by preventing the loss or reducing the chance that it will occur. Some techniques are used to prevent the occurrence of the loss, and other techniques like sprinkler systems are intended to control the severity of the loss if it does happen. No matter how hard we try, it is impossible to prevent all losses. The loss prevention technique cannot cost more than the losses.

Risk Retention

Risk retention is the most common method of dealing with risk. Organizations and individuals face an almost unlimited number of risks, and in most cases nothing is done about them. When some positive action is not taken to avoid, reduce, or transfer the risk, the possibility of loss involved in that risk is retained. Risk retention can be conscious or unconscious. Conscious risk retention takes place when the risk is perceived and not transferred or reduced. When the risk is not recognized, it is unconsciously retained—the person retains the financial risk without realizing that he or she is doing so. Risk retention may be voluntary or involuntary. Voluntary risk retention is when the risk is recognized and there is an agreement to assume the losses involved. This is done when there are no alternatives that are more attractive. Involuntary risk retention takes place when risks are unconsciously retained or when the risk cannot be avoided, transferred, or reduced. Risk retention may be the best way. Everyone decides which risks to retain and which to avoid or transfer. A person may not be able to bear the loss. What may be a financial disaster for one may be handled by another. As a general rule, the only risks that should be retained are those that can lead to relatively small certain losses.

Risk Transfer

Risk may be transferred to someone who is more willing to bear the risk. Transfer may be used to deal with both speculative and pure risk. One example is hedging; hedging is a method of risk transfer accomplished by buying and selling for future delivery so that dealers and processors protect themselves against a decline or increase in market price between the time they buy a product and the time they sell it. Pure risks may be transferred through contracts, like a hold-harmless agreement where one individual assumes another’s possibility of loss. Contractual agreements are common in the construction industry. They are also used between manufacturers and retailers about product liability exposure. Insurance is also a means of transferring risk. In consideration of a payment or premium, by one party, the second party contracts to indemnify the first party up to a certain limit for the specified loss.

Risk Sharing

This is a special case of risk transfer and retention. When risks are shared, the possibility of loss is transferred form the individual to the group. A corporation is a good example of risk sharing—a number of investors pool their capital, and each only bears a portion of the risk that the enterprise may fail.

A TRA will incorporate a combination of mitigation tools into the TRA.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128094877000024

Risk Management

Stephen D. Gantz, Daniel R. Philpott, in FISMA and the Risk Management Framework, 2013

Respond

Once the organization determines the nature, significance, and priority of risk, system owners, business owners, and risk mangers consider possible responses to risk and choose the most appropriate course of action. NIST guidance recognizes five primary responses to risk: acceptance, avoidance, mitigation, sharing, or transference [52]. Courses of action for risk response may include more than one type of response, potentially authorized and executed at multiple levels of the organization. While system owners often recommend responses to risk identified at the information system level, analysis of alternative courses of action and selection of risk response consider impacts at all levels of the organization, so typically require decision-making at mission and business or organizational levels. Depending on the governance structure and approach to enterprise risk management used in an organization, the risk management strategy developed during risk framing may include organizational policies or standards regarding risk response alternatives that provide guidance to risk managers on preferred or default courses of action. The appropriate level at which risk response decisions are made also depends in part on the scope of the response measures being considered. Risk-mitigating changes to enterprise infrastructure, operating environments, or common controls affecting the entire organization should be approved at the organizational level. Similarly, decisions to accept risk at lower levels of the organization should be consistent with organizational risk tolerance, so may require review or approval at the organizational level.

Risk Response Identification

For any risk identified and evaluated in the risk management process, risk managers need to consider potential responses to risk, alone or in combination, and identify the possible courses of action. The exact number and variety of alternatives considered for a risk response may be constrained by policies or guidance in the risk management strategy, but candidate responses typically include the following [53]:

Acceptance. When the risk determination falls within the organizational risk tolerance, accepting the risk may be justified. When risk tolerance includes cost-benefit considerations, risk acceptance may also be warranted when the cost of mitigation exceeds the anticipated loss to the organization if the risk is realized.

Mitigation. Risk mitigation includes remedial or corrective action taken to reduce the level of risk to the organization, with the goal of bringing the risk level within organizational risk tolerance so that any residual risk can be accepted. Mitigating actions chosen for a given risk may be implemented at multiple levels of the organization.

Sharing. Risk sharing occurs when responsibility for risk borne by one organization can be shared with another, in a manner that may not reduce the total risk, but reduces the risk faced by each sharing organization to an acceptable level. Organizations with different risk tolerance levels may be able to use risk sharing to align responsibility for different types of risk with commensurate risk tolerance levels, and to assign responsibility for specific types of risk to organizations with the appropriate expertise or resources to address them.

Transference. Organizations unwilling or unable to accept, mitigate, or share risk may choose to transfer the risk by shifting responsibility or liability for the consequences of an adverse event to another organization, such as by purchasing insurance against loss or harm. Risk transference does not reduce the likelihood, harm, or risk associated with an event, but typically compensates the organization for losses.

Avoidance. Risks determined to be unacceptable to the organization and infeasible to mitigate, share, or transfer may warrant changes to information systems or processes implemented by the organization to avoid incurring the risk associated with them. Avoiding information system-level risk often requires reducing the scope or functional capability to reduce the threats or vulnerabilities applicable to systems or business processes. Examples of risk avoidance methods include foregoing system interconnections in favor of manual processes or integration methods, or choosing to limit web-based access methods to intranet or VPN-based connections rather than allowing Internet connections.

Alternative courses of action to respond to risk may involve multiple steps or discrete actions taken at one or more levels of the organization. Risk managers at mission and business or organization tiers may evaluate multiple risk response decisions together to determine appropriate organizational responses, particularly when similar risk is identified in multiple risk assessments.

Warning

NIST guidance omits an additional response to risk that risk management practitioners may encounter: denial. Risk denial is a refusal to acknowledge a risk produced in an assessment, essentially making an assertion that the risk does not apply to the organization. Risk denial should not occur in organizations with accepted, established risk management procedures, and instances of risk denial often indicate a lack of awareness among risk management decision makers or poor communication between decision makers and business owners or system owners responsible for conducting risk assessments.

Evaluation of Alternatives

In situations where more than one course of action is identified to respond to risk, risk managers must evaluate each alternative to determine the preferred approach. The criteria used in evaluating alternative risk responses may be specified in the risk management strategy or be determined on a case-by-case basis for each risk or type of risk. Typical evaluation factors include costs that will be incurred or other resources that must be allocated to implement each course of action; the feasibility of each response given potential time pressures, necessary technical expertise, or other organizational constraints; and the anticipated effectiveness of each course of action in achieving the desired result. Risk responses in information security contexts usually involve trade-offs between increased assurance levels (and corresponding reductions in risk) and operational capabilities. Risk responses with the potential to reduce operational effectiveness should consider the relative priority of impacted mission functions and business processes, using risk prioritization information contained in the risk management strategy.

Risk Response Decision

The evaluation of risk response alternatives typically results in a recommended course of action. Formal decisions to adopt recommended courses of action often employ many of the same criteria used in the evaluation of alternatives, including the economic impact on the organization and the effect of the risk response on mission and business functions. Organizations face many risks at any point in time, so risk response decisions rely on organizational risk priorities to determine the most appropriate allocation of resources, generally devoting more resources to areas of greater risk, or prioritizing responses with the greatest potential effect in reducing overall risk to the organization. Risk response decisions reflect the organizational goal of consistently managing risk to levels within the organization’s risk tolerance. Risk responses do not eliminate risk, but instead reduce or manage risk exposure so that residual risk—risk that remains after responses are implemented—is acceptable to the organization.

Risk Response Implementation

Selected courses of action must be implemented to achieve the results sought from risk response. The time required to fully implement a given course of action varies according to factors such as the complexity of the response, size of the organization, characteristics of its operating environment, and the number of internal or external organizational units that need to be involved. In its risk management strategy, an organization may specify different risk response strategies to guide responses to various types of risk, as well as an overall approach to selecting appropriate responses. NIST provides general guidance on risk response strategies in Special Publication 800-39. Such strategies specify roles within the organization responsible for different risk response types; existing or anticipated dependencies among selected risk response measures or on other factors; implementation timelines for risk responses; procedures and requirements for monitoring risk response effectiveness; triggers invoking risk monitoring or renewed assessment activities; and the availability of any interim risk response measures [54].

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597496414000138

Which process involves determining what risk are likely to affect a project and documenting the characteristics of each?

Risk identification involves determining which risks might affect the project and documenting their characteristics. Risk identification is an ongoing process and should be performed throughout the project.

Which action involves doing whatever you can to make sure the positive risk happens quizlet?

occurrence. _____ involves doing whatever you can to make sure the positive risk happens. Risk exploitation involves doing whatever you can to make sure the positive risk happens.

Which process involves prioritizing risks based on their probability of occurrence and impact?

Performing qualitative risk analysis involves: prioritizing risks based on their probability and impact of occurrence.

Which technique is used to show the effects of changing one or more variables on an outcome?

Glossary
Sensitivity analysis
A technique used to show the effects of changing one or more variables on an outcome.
Top Ten Risk Item Tracking
A qualitative risk analysis tool for identifying risks and maintaining an awareness of risks throughout the life of a project.
Triggers
Indications for actual risk events.
Student Resource Glossary - Cengagewww.cengage.com › cgi-wadsworth › course_products_wp › resource_id=10null