Security Program Integration Professional Certification (SPIPC) Exam What is the purpose of the asset assessment step of the risk management process?
... [Show More] • Identify assets requiring protection and/or that are important to the organization and to national security • Identify undesirable events and expected impacts • Prioritize assets based on consequences of loss What is the purpose of the threat assessment step of the risk management process? • Determine threats to identified assets • Assess intent and capability of identified threats • Assess current threat level for the identified assets What is the purpose of the vulnerability assessment step of the risk management process? • Identify existing countermeasures and their level of effectiveness in reducing vulnerabilities • Identify potential vulnerabilities related to identified assets and their undesirable events • Identify current vulnerability level for the identified assets that can be exploited by the identified threats What is the purpose of the risk assessment step of the risk management process? • Integrate information about the impact of undesirable events (collected during the asset assessment step) and the likelihood of undesirable events (based on information collected during the threat and vulnerability assessment steps) to determine risks to identified assets What is the purpose of the countermeasure determination step of the risk management process? • Identify potential countermeasures to reduce vulnerability and/or threat and/or impact • Identify countermeasure benefits in terms of risk reduction • Identify countermeasure costs • Conduct cost/benefit analysis • Prioritize options and prepare recommendation for decision maker What is the primary benefit of conducting the risk management process? • National-level security policy endorses a holistic risk management approach, allowing decision makers to effectively allocate resources that provide the necessary security to assets that match the threat to those assets What are the primary costs of conducting the risk management process? • Time and effort necessary to execute the five steps of the risk management process What are the potential challenges security practitioners may face when enacting the risk management process? • Availability of information necessary to accurately determine the likelihood and impact of undesirable events Where can we get information to evaluate an organization's compliance with security policies? • Self-inspections Where can we get information to evaluate the effectiveness of an organization's security program? • Incident reports • Regressive analysis • SME interviews (individuals involved in protecting Classified Military Information (CMI)) • Security planning documents • Surveys and audits • Information Systems (IS) Certification and Accreditation documentation • Facility certification and accreditation documentation Given the incident, what is an example of an organization complying with security policy, but the measure(s) it implemented appear to be ineffective? • The appropriate signage and notices are posted in appropriate areas, but are potentially ineffective considering a history of uncleared personnel gaining access to restricted areas. How do security policies and programs contribute to managing risks to Department of Defense (DoD) assets? • Security policies manage risks to DoD assets by specifying baseline requirements for protecting categories of DoD assets, and by identifying who is responsible and accountable for executing those requirements. • Security programs manage risks to DoD assets by administering those security policies and ensuring hose baseline requirements are being executed per policy. [Show Less]