BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
URL:https://www.learndesk.us/class/6529278948671488/lesson/af41e86545bc839d2ba5e2c1aa2b4aa8?ref=outlook-calendar
SUMMARY:Check Yourself Definition
DTSTART;TZID=America/Los_Angeles:20260504T190000
DTEND;TZID=America/Los_Angeles:20260504T200000
LOCATION:https://www.learndesk.us/class/6529278948671488/lesson/af41e86545bc839d2ba5e2c1aa2b4aa8?ref=outlook-calendar
DESCRIPTION: 

This quiz gives you a rough idea as to what your risk appetite may be.

How much risk you can afford to take
How much risk you need to take to achieve your objective
How much risk you prefer to take to feel comfortable


Is there a treat for a useless system?
Even though vulnerability is high for a useless system, there is no threat
Steps of Risk Assessment

Identify critical assets/processes
Identify relevant risks (vulnerability and threat)
Do impact analysis (qualitative and quantitative)
Risk prioritization
Risk treatment

Question: IS Auditor identified certain threats and vulnerabilities in a business process. Next, an IS auditor should:A. Identify stakeholder for that business process.B. Identify information assets and the underlying systems.C. Disclose the threats and impacts to management.D. Identify and evaluate the existing controls.
Answer: C. Disclose the threats and impacts to management.
Avoid confusion between Threat and vulnerability

A threat is what we’re...

https://www.learndesk.us/class/6529278948671488/lesson/af41e86545bc839d2ba5e2c1aa2b4aa8?ref=outlook-calendar
STATUS:CONFIRMED
SEQUENCE:3
BEGIN:VALARM
TRIGGER:-PT10M
DESCRIPTION:Class Reminder
ACTION:DISPLAY
END:VALARM
END:VEVENT
END:VCALENDAR