You are on page 1of 3

Week 3 Seminar Exercises Questions

Review Questions
1. What is competitive advantage? How has it changed over the years since the IT industry

began?

2. What is competitive disadvantage? Why has it emerged as a factor?

3. What are the four risk control strategies?

4. Describe the strategy of risk avoidance.

5. Describe the strategy of risk transference.

6. Describe the strategy of risk mitigation.

7. Describe the strategy of risk acceptance.

8. Describe residual risk.

9. Describe how outsourcing can be used for risk transference.

10. What conditions must be met to ensure that risk acceptance has been used properly?

11. What is risk appetite? Explain why risk appetite varies from organization to organization.

12. What is a cost-benefit analysis?

13. What is single loss expectancy? What is annual loss expectancy?

14. What is the difference between benchmarking and baselining? What is the difference

between due diligence and due care?

15. What is the difference between organizational feasibility and operational feasibility?

16. What is the difference between qualitative measurement and quantitative measurement?

Recommended Exercises Completed in the Lab

1. Using the following table, calculate the SLE, ARO, and ALE for each threat category listed.

XYZ Software Company. Major Threat Categories for New Applications Development
(Asset value: $1,200.000 in projected revenue)
Cost /Incident (SLE) Frequency of Occurrence
Programmer Mistakes $5000 1 per week
Loss of Intellectual Property $75,000 1 per year
Software Piracy $500 1 per week
Theft of Information (Hacker) $2500 1 per quarter
Theft of Information (Employee) $5000 1 per 6 months
Web Defacement $500 1 per month
Theft of Equipment $5000 1 per year
Viruses, Worms, Trojan Horses $1500 1 per week
Denial-of-Service Attack $2500 1 per quarter
Earthquake $250,000 1 per 20 years
Flood $250,000 1 per 10 years
Fire $500,000 1 per 10 years

0. Assume a year has passed and XYZ has improved its security. Using the following table,
calculate the SLE, ARO, and ALE for each threat category listed. Why have some values
changed in the following columns: Cost per Incident and Frequency of Occurrence? How could
a control affect one but not the other?

Cost/Incident Frequency of Cost of


Type of Control
(SLE) Occurrence Controls
Programmer Mistakes $5000 1 per month $20,000 Training
Loss of Intellectual Property $75,000 1 per 2 years $15,000 Firewall/IDS
Software Piracy $500 1 per month $30,000 Firewall/IDS
Theft of Information
$2500 1 per 6 months $15,000 Firewall/IDS
(Hacker)
Theft of Information
$5000 1 per year $15,000 Physical Security
(Employee)
Web Defacement $500 1 per quarter $10,000 Firewall
Theft of Equipment $5000 1 per 2 year $15,000 Physical Security
Viruses, Worms, Trojan
$1500 1 per month $15,000 Antivirus
Horses
Denial-of-Service Attack $2500 1 per 6 months $10,000 Firewall
Insurance/Backup
Earthquake $250,000 1 per 20 years $5000
s
Insurance/Backup
Flood $50,000 1 per 10 years $10,000
s
Insurance/Backup
Fire $100,000 1 per 10 years $10,000
s

0. Search the Web site: www.cert.org/octave/omig.html, and download the OCTAVESM


Method Implementation Guide. Read through the file named “vol1”, “Volume 1: Introduction”, to
understand, as much as you can, the Operationally Critical Threat, Asset, and Vulnerability
Evaluation Method (OCTAVE ). SM
0. Search and learn the Microsoft Risk Management Approach through the following Web
site: www.microsoft.com/technet/security/topics/complianceandpolicies/secrisk/default.mspx

Note. The answers to those excises completed in the lab depend on the circumstances of
those Web sites and individual students.

You might also like