All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
principles of risk management
Questions and Answers of
Principles Of Risk Management
In what ways can air side personnel pose risks?
In what ways do checked luggage need different screening than carryon luggage?
In what ways are cargo-only flights more or less risky than passenger flights?
Why are terrorists focused on civilian aviation?
In what ways are sovereign threats to aviation greater than terrorist threats?
Describe the positive and negative risks of vehicle escorts and guards.
Describe the trade-off between a vehicle’s survivability and mobility.
Describe the trade-off between a vehicle’s overt survivability and stealth.
Explain why a vehicle’s resistance to kinetic attacks can be antagonistic to blast resistance.
How could you prepare for ground navigation in case of an emergency?
Describe routine activities necessary to secure the ground transport infrastructure.
Describe the three main ways in which terrorists and insurgents target ground transportation.
What compound risks arise from road traffic accidents?
Describe different modes of ground transportation and why they become more or less important as an area becomes less stable or developed.
Give examples of two-step access controls.
How could a website encourage more secure passwords?
How could a threat acquire your password?
Give an example of a nondigital activity that would help to provide cyber security.
Why should an organization define its sensitive information?
How can DOS attacks be countered?
Why have DOS attacks become easier?
What is the difference between a logic bomb and denial of service?
What is the international dispute about the governance of the Internet?
Why is digital misinformation difficult to prosecute in court?
Why are states blamed for objectionable information?
What is a “digital wildfire”?
How can social media both contribute to and counter misinformation?
Under what circumstances are wireless networks likely to be less secure?
What are the security advantages and disadvantages of cloud computing?
Why are mobile devices vectors?
What are the three main ways in which e-mail is a vector for unauthorized access to information?
How can you reduce the insecurity of your personal e-mail?
How can you reduce the insecurity of your personal telephone communications?
How can threats intercept telephone communications?
When are officials more likely to intercept private telephone communications?
Why is postal communication useful to a comprehensive information security plan?
When are people likely to be most revealing through social media of private information?
Describe the similarities and differences in risks for juveniles and adults.
How does social media enablea. violations of privacy?b. abuse?
While visiting a webpage is usually harmless, describe the harmful vector.
Consider the case of British journalists and officials accessing or transferring private data improperly. Why did this continue largely unchecked for years, despite the Data Protection Act of 1998?
By what four main social interactions could a threat obtain private information about you?
What is the official difference between a computer virus, worm, and Trojan Horse?
What is an access control?
What is an access vector?
How can APTs be especially countered?
Describe the opportunities for external threats during the lifecycle of an item of ICT.
How could a commercial relationship become an external threat?
What is the relationship between insider and external threats?
Describe the known motivations and intentions of insider threats.
What differentiates the objectives of most criminals when they acquire private information?
What was Sandia National Laboratories’ warning about conventional categorization of the sources of cyber attacks?
What is the difference between ICT and cyber space?
Give examples of information outside of cyber space.
What two threats are blocked by protective glass?
Why is reinforced concrete a useful material for resisting kinetic attack?
Give some examples of improvised blast barriers.
What are the advantages and disadvantages of setback as material protection?
Why is counter-surveillance useful at a site?
Why should humans be part of a perimeter?
Give some examples of passive material barriers.
What should you specify for a refuge?
Why would we want a containment area at the point of access?
Why would we want multiple gates at the point of access?
Why would good guards need a quick reaction force?
Why do guards face more risks?
How can threats bypass control controls?
What is the best way to assess our access controls?
Why are controls used to control exit as well as access?
How could you select locations that are more secure?
How would you explain NATO’s responsibility for the changes in the risks to NATO logistics in Afghanistan and Pakistan in 2008 and 2009?
Design a better method for assessing UN operational risks.
What is business continuity?
What is the difference between operations risk and operational risk?
Give an example of a compound operational risk.
What are typical threats to operations?
What is the difference between operations and logistics?
Which of the six “T” strategies is illustrated by each of the following examples:m. moving my shipping to a country with a larger charity supporting victims of shipping disasters, n. moving my
What are the typical disadvantages of thinning the risks?
How does thinning (diversifying) our risks reduce our total risk without reducing any particular risk?
Name as many as possible of the nine synonyms for strategies or activities that seek to control potential negative returns.
With what sorts of actor should we not transfer or share risks, even if they were willing to do so?
What are the six vectors for transferring or sharing risks?
Why might you reasonably disallow taking a risk even if it offers a positive range of returns?
What sorts of expected returns and range of returns would justify taking a risk?
How could we unintentionally turn a positive risk into a negative risk?
What sorts of objections should we expect when turning a risk?
What sorts of sources of a risk are more justifiable terminated?
What is the correct strategic response to a tolerable risk?
Which of the six “T” strategies is illustrated by each of the following examples:a. staying out of an insecure area,b. exiting a risky area,c. offering amnesty to a human threat,d. offering an
Forecast an operational problem when contributors work alongside each other with different controls on the same risk.
Why might different contributors to an activity work alongside each other with different controls on the same risk?
Why might a tolerable risk be controlled?
If someone tells us that they cannot control an intolerable risk, what unjustifiable reasons should we worry about them not admitting?
How could we justify tolerating a risk that has been assessed as intolerable?
What is a compound risk?
What do we call risks before and after controls have been applied to them?
What is the difference between a control and a strategy in response to risk?
Humans are more often the victims of dog attacks than shark attacks, but why might the actual risks of shark attacks be greater?
Why is popular culture more interested in shark attacks than dog attacks?
Showing 800 - 900
of 3506
First
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Last