Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

FAIR Open Group Certification (All Solved Correctly) 2024 UPDATE

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
05-01-2024
Written in
2023/2024

Loss Event Frequency correct answers Loss Event Frequency (LEF) is the probable frequency, within a given timeframe, that a threat agent will inflict harm upon an asset. In basic terms this can be thought of as how often a bad thing happens to something that we care about; for example, how often your money is stolen, or how many times per year hackers perform a denial of service attack against your online banking system. Threat Event Frequency correct answers Threat Event Frequency (TEF) is the probable frequency, within a given timeframe, that a threat agent will act in a manner that could result in a loss. For example, the probable frequency, within a given timeframe, that a thief tries to steal the money, a tornado hits a building, hackers perform a denial of service attack on your computer system, etc. Contact Frequency correct answers Contact Frequency (CF) is the probable frequency, within a given timeframe, that a threat agent will come into contact with an asset. Contact can be physical or "logical" (e.g., over the network). Probability of Action correct answers Probability of Action (PoA is the probability that a threat agent will act against an asset once contact occurs. Once contact occurs between a threat agent and an asset, action against the asset may or may not take place. For some threat agent types, especially natural threat agents, action always takes place. For example, if a tornado comes into contact with a house, action is a foregone conclusion. Vulnerability correct answers The definition of Vulnerability in the FAIR risk taxonomy departs from the casual or informal use of the term. Vulnerability (Vuln) is the probability that a threat event will become a loss event. Vulnerability exists when there is a difference between the force being applied by the threat agent, and an object's ability to resist that force. This simple analysis provides us with the two primary factors that drive Vulnerability: Threat Capability (TCap) and Resistance Strength (RS). Threat Capability correct answers Threat Capability (TCap) is the probable level of force that a threat agent is capable of applying against an asset. Not all threat agents are created equal. In fact, threat agents within a single threat community are not all going to have the same capabilities. Resistance Strength correct answers Resistance Strength (RS) is the strength of a control as compared to a baseline measure of force. In simple terms, this can be considered the degree of difficulty faced by the threat agent. For example, a wireless network secured by WPA2 has a higher RS to a hacker community than one secured by WEP. Loss Magnitude correct answers Loss Magnitude (LM) is the probable magnitude of loss resulting from a loss event. The other side of the taxonomy under Loss Event Frequency introduced the factors that drive the probability of loss events occurring. The Loss Magnitude side of the taxonomy describes the other half of the risk equation - the factors that drive loss magnitude when events occur. Primary Loss correct answers Primary Loss is the direct result of a threat agent's action upon an asset and often represents the intention in acting against the asset. The owner of the affected assets is considered the primary stakeholder in an analysis. Secondary Loss correct answers Secondary Loss is a result of secondary stakeholders (e.g., customers, stockholders, regulators, etc.) reacting negatively to the primary loss event. Think of it as "fallout" from the primary event. Secondary Loss has two primary components: Secondary Loss Event Frequency (SLEF) and Secondary Loss Magnitude (SLM). Secondary Loss Event Frequency correct answers Secondary Loss Event Frequency (SLEF) is an estimate of the percentage of time a scenario is expected to have secondary effects. Secondary Loss Magnitude correct answers Secondary Loss Magnitude is the losses that are expected to materialize from dealing with secondary stakeholder reactions (e.g., fines and judgments, loss of market share, etc.). Action correct answers An act taken against an asset by a threat agent. Requires first that contact occurs between the asset and threat agent.

Show more Read less
Institution
Course

Content preview

FAIR Open Group Certification (All Solved Correctly)
Loss Event Frequency correct answers Loss Event Frequency (LEF) is the probable frequency,
within a given timeframe, that a threat agent will inflict harm upon an asset. In basic terms this
can be thought of as how often a bad thing happens to something that we care about; for
example, how often your money is stolen, or how many times per year hackers perform a denial
of service attack against your online banking system.

Threat Event Frequency correct answers Threat Event Frequency (TEF) is the probable
frequency, within a given timeframe, that a threat agent will act in a manner that could result in a
loss. For example, the probable frequency, within a given timeframe, that a thief tries to steal the
money, a tornado hits a building, hackers perform a denial of service attack on your computer
system, etc.

Contact Frequency correct answers Contact Frequency (CF) is the probable frequency, within a
given timeframe, that a threat agent will come into contact with an asset. Contact can be physical
or "logical" (e.g., over the network).

Probability of Action correct answers Probability of Action (PoA is the probability that a threat
agent will act against an asset once contact occurs. Once contact occurs between a threat agent
and an asset, action against the asset may or may not take place. For some threat agent types,
especially natural threat agents, action always takes place. For example, if a tornado comes into
contact with a house, action is a foregone conclusion.

Vulnerability correct answers The definition of Vulnerability in the FAIR risk taxonomy departs
from the casual or informal use of the term. Vulnerability (Vuln) is the probability that a threat
event will become a loss event. Vulnerability exists when there is a difference between the force
being applied by the threat agent, and an object's ability to resist that force. This simple analysis
provides us with the two primary factors that drive Vulnerability: Threat Capability (TCap) and
Resistance Strength (RS).

Threat Capability correct answers Threat Capability (TCap) is the probable level of force that a
threat agent is capable of applying against an asset. Not all threat agents are created equal. In
fact, threat agents within a single threat community are not all going to have the same
capabilities.

Resistance Strength correct answers Resistance Strength (RS) is the strength of a control as
compared to a baseline measure of force. In simple terms, this can be considered the degree of
difficulty faced by the threat agent. For example, a wireless network secured by WPA2 has a
higher RS to a hacker community than one secured by WEP.

Loss Magnitude correct answers Loss Magnitude (LM) is the probable magnitude of loss
resulting from a loss event. The other side of the taxonomy under Loss Event Frequency
introduced the factors that drive the probability of loss events occurring. The Loss Magnitude
side of the taxonomy describes the other half of the risk equation - the factors that drive loss
magnitude when events occur.

Written for

Course

Document information

Uploaded on
January 5, 2024
Number of pages
4
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
THEEXCELLENCELIBRARY Harvard University
Follow You need to be logged in order to follow users or courses
Sold
18
Member since
2 year
Number of followers
6
Documents
2641
Last sold
3 months ago
THE EXCELLENCE LIBRARY

The Excellence Library Where Academic Success Begins. Welcome to The Excellence Library — your trusted marketplace for past and upcoming exam papers with verified answers, spanning all academic fields. Whether you're a med student, a future lawyer, a high schooler prepping for finals, or a researcher looking for model dissertations — we've got you covered. What We Offer Accurate & Complete Exam Papers From Medicine, Nursing, Law (Bar Exams), High School subjects, and more. Model Dissertations & Novels Top-tier academic references and full-text materials to guide your writing and study. Affordable & Fair Pricing Quality resources at a price that respects students' budgets. Why Choose Us? Thoroughly Reviewed Answers – Every paper includes clear, correct solutions. Massive Library – Thousands of documents, constantly updated. Academic Excellence, Delivered – We help you prepare smarter, not harder. Fast Delivery – Get what you need, when you need it. Our Goal To empower students and professionals by offering reliable, affordable academic materials — helping you succeed one paper at a time.

Read more Read less
2.5

2 reviews

5
0
4
0
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions