- Last 7 days
-
ia601503.us.archive.org ia601503.us.archive.org
-
Admitit.Thisisthepoemyouwantedallalong
the poem you were expecting him to write? or the poem you've always been waiting to read?
-
Just kidding I never think.
italics is tommy pico, communicates with teebs
-
I can’t write a nature poem be English is some Stockholm shit,makes me complicit in my tribe’s erasure —why shd I give a fuck abta“poetry’? It’s a containerfor words like whilst and hither and tamp. It conducts something ofpermanent and universal interest. Poems take something like an apple,turn it into the skin, the seeds, and the core. They talk abt gravity, abtAdam, and Snow White and the stem of knowledge.
battles with his relationship as an english speaking poet and being an ndn
-
People r so concerned abt “the Earth”in the sense of kale salad and bruisedgilShe'll be just fine. We might not make it, hopefully. We’ll exhaustourselves soon what with global population blooms and SanLoco macho nachos and ruddy from frozen margaritas you reach formy arm. You drifted off again. You ask, What are you thinking about?
goes against what a lot of nature poems are about
saying that the earth will be fine it's just the human race that'll die out
-
I don’t like thinking abt nature be nature makes me suspect there is a god.
VERY personal
something that I empathize with a lot nature threatening you with the existence of god
-
Winter is a death threat from nature, and I don’t respond well to predation —it’s not like summer, death in the form of barking mentakin issue w/the short shorts and the preen and the queenly holdinghandsgod forbid u step into the gnashing cold for a fizzy water and grapes,
poetic and nature
meter + sibilance
-
My primary device is personification, says Nature. Do your associationsconsider my mercurial elements?
Nature
in poetry we personify nature a lot, this also builds off the other one I highlighted about nature threatening you with the existence of god
-
We are the last animal to arrive in the kingdom —even science will tellyou that.My father takes me into the hills we cut sage. He tells me to thankthe plant for its sacrifice, son. Every time I free a switch of it a burst ofprayer for every leaf.I’m swoll on knowing this? Sharing the pride of plantsMy mother waves at oak trees. A doctor delivers her diagnosis.When she ascends the mountains to pick acorn, my mothermotherfucking waves at oak trees. Watching her stand there, herhands behind her back, rocking, grinninginto the face of the bark
nature
-
I look too much into the mirror of my worst selfso life feels like always breakin in a pair of new shoesand my hunch is we'll be naked soon having sex like those handsoapsthat smell like parsley sort of refreshing but chemical Nothing like thereal thing n you wd prolly notice if we fucked with all my clothes onbe yr of course so hazeland stupid.Nothing can fall that wasn’t builtexcept maybe my self-esteem be I have a hunch that I was born with itintact but then America came smackedme across the face said like itn the sick thing is getting smacked across the face makes me so wet rnand that’s prolly why poetry, be in order to get insidea poem has to break youthe way the only thing more obvious than your bodyis leaving yr shirt on in the pool
Tone
goes with the rambling style of prose that he keeps using
-
I like the way my head shiversrestin on yr stomach when you say IfIkeep hanging out w/u I’m gonnaget a six packfrom laughing.
personal
-
Grief is sneaking cigs from the styrofoam cups on the tables next to thecreamers and plates of Mary’s pineapple upside-down cake, running off tothe playground behind the schoolroom trailers to (try and) smoke the
Poetic
"Grief is" metaphor
-
the fabric of our lives #death
Tone
all of the #death stuff, mentioned in the blurb
-
There’s no exposure in Southern California,no clanging heat in San Diego.in LA? The snow comes in a can.
poetic
I just really like this passage
-
“Malibu” by Hole is one of the greatest songs in Americawhen I was younger I thought it was a sexy like summer story abt thesandy aesthetic wonder of aSoCal summer beach townHow you listen to something completely in yr own head.
Personal
-
My singing teacher tells me find your centerTornado fucking is a natural phenomenonwherein you start on your stomach,get flipped to the right side,then he slides under you slamsu into his hips, both in a sort of crab walk flip leftbefore returning to (yoga term) stomach pose.
Tone combines nature with fucking...I think...
-
- Mar 2025
-
Local file Local file
-
we can find the words to describe
similar to the first step of activism - getting people to become aware of the issue and think about it - you can't do that without the proper words to describe it
-
- Jan 2025
-
cod.pressbooks.pub cod.pressbooks.pub
-
discuss the difference between applied and theoretical criminology.
Applied criminology focuses on reducing crime through actionable means. Theoretical criminology seeks to explain criminal behavior by developing and refining theories.
-
explain the difference between determinism and positivism.
Determinism and positivism are two frameworks that attempt to explain human behavior. Determinism argues that it is influenced by factors outside of one's control. Positivism, on the other hand, asserts that, through scientific observation, human behavior can indeed be studied and understood.
-
restate the tenets of rational choice theory
In the field of criminology, rational choice theory suggests that individuals engage in crimes they believe are a low risk activity through comparing the benefits of committing a crime with the risks of getting caught.
-
define determinism
Determinism is a theoretical framework in criminology that suggests human behavior is influenced by factors beyond individual control.
-
Identify variables used during social science inquiry
The variables used during social science inquiry are socioeconomic status, education, and environment.
-
summarize the history and evolution of criminology. recognize those contributions to the discipline made by Edwin Sutherland.
Edwin Sutherland work, emphasizing the role of socialization in the development of criminal behavior, has been a key contribution to the role of criminology. Criminology has evolved to become more nuanced, with multiple frameworks emerging to explain why and what types of individuals commit crimes.
-
describe the work of criminologists.
Criminologists aim to advance the understanding of crime through research-based methods. Through identifying variables that contribute to crime, criminologists develop and apply theories to explain why individuals engage in crime.
-
discuss the difference between criminal justice and criminology
While criminology is the study of crime and criminals, criminal justice refers to methods established by the government that are used to prevent, deter, and control crime.
-
define criminology
Criminology is a field of study that focuses on analyzing crime and criminals to understand why crime happens, what types of people are prone to criminal action. Research is used to find ways to promote social justice and prevent crime from happening.
-
-
poets.org poets.org
-
remained destined to strike a single match
referring to a moment of destruction, some singularity leading to some apocalyptic event
-
paradise
a lot of religious references, with prophets, the same hand, paradise, potentially the 12 prophets
-
12th
perhaps a nod to the 12 prophets of islam?
-
nightingale
nightingales are significant to poetry John Keats' "ode to a nightengale"
-
The 12th nightingale arrived like a prophet in a cloud of smoke
wtf does this mean
-
cardboard orchard
cardbOard, ORchArd
-
bees on budding flowers.
alliteration
-
translation of Haji Khavari
translated from farsi
-
scent of hot plastic.
contrasts with "budding flowers" and "lemon trees"
-
The 3-D printer worked overtime sculpting lemon trees complete with bees on budding flowers.
plastic making beautiful examples of nature
-
lemon trees
lemon trees represent a lot of stuff
-
a paradise of paper.
is he referring to trees?
-
-
www.gao.gov www.gao.gov
-
Additionally, Equifax reported that it would provide several services to allU.S. consumers, regardless of whether their information had beencompromised, free of charge for one year.
Frank Abagnale's video talked about why this was a bad idea- most stolen PII isn't even used for at least like 3 years
-
After additional analysis, including a determination that thequery had, in fact, allowed the attackers to access PII from approximately2.5 million additional U.S. consumers, Equifax revised the number ofaffected individuals from 143 million to 145.5 million on October 2, 2017.
going under my "royal fuckups" header for notes on this case study
-
Equifax Identified SeveralFactors That the AttackerExploited During theBreach
According to Equifax, the key factors for why they got breached were failures in identification, detection, segmentation, and data governance.
-
-
pressbooks.bccampus.ca pressbooks.bccampus.ca
-
Topic 7: Rules of Engagement for an Active Event or an Inactive Event
When arriving on scene, the investigator must be able to classify the event and discern what, if any offence has been committed.
Based on the type of offence and the classification of the event, the law provides certain powers for taking action. Officers must know the law when taking action and entering a property.
-
More on Offence Recognition
Officers need to be able to recognize if and what offence is taking place while also trying to classify the event.
Knowing what offence has taken place is important because the investigator will then know what type of evidence they need to look for and under what circumstances can they enter an property legally.
-
As part of attendance to the scene of the event
While on the scene of the event, the investigator has to know the legal grounds to which they are able to enter the property: * consent of the property owner * obtain a warrant * exigent circumstance * in active pursuit of the suspect
-
If the investigator determines that they are attending to an Active Event
If the investigator determines that the event is active and the offence poses a threat to Level One Priorities, then they know that they can make an arrest if they can find evidence to support reasonable grounds to do so.
-
Having an offence in mind, the investigator will also begin to consider their range of powers and authorities that can be used under the law regarding that offence.
If an officer suspects that a crime has been committed, they need to discern whether they need to catch the suspect in the act (summary conviction) or if there is already enough evidence (indictable/dual procedure) to make an arrest.
-
Police officers may be called to action by many different means.
When called on scene, a police officer will have to determine if the event taking place is active or inactive. If it is active, thus requiring a tactical investigative response, they need to discern if there is a threat to Level One Priorities.
Because information is limited in these scenarios, the law allows for "exigent circumstances" - scenarios in which an officer can rely on certain powers to protect Level One Priorities.
-
exigent circumstances
circumstances predetermined by law for when an officer can enter a property and make an arrest without a warrant
active event + explicit or implied threat to life or safety = exigent circumstances
-
Topic 6: Threat vs. Action Analysis Dilemma
This dilemma arises when a crime is actively being committed that presents a direct threat to the safety of others. For example, an active shooter scenario poses this dilemma because the responding officer must weigh the available information and decide if they should respond or wait for backup.
-
An Inactive Event
Requires a Strategic Tactical Investigative Response 1. The criminal act has concluded at the scene. 2. The suspect or suspects have left the scene or have been arrested or detained. 3. The situation at the scene no longer represents a danger to the life or safety of a person, including police officers.
-
Topic 5: Classifying the Event as Either an Active Event or an Inactive Event
When at the scene of an event, the investigator must always assume that the event is inactive until proven otherwise. Knowing if an event is active or inactive is imperative to deciding further action.
-
An Active Event
Requires a Tactical Investigative Response 1. The criminal act is or may still be in progress at the scene. 2. The suspect is or may still be at the scene of the event. 3. The situation is, or may be, a danger to the life or safety of a person, including the life or safety of attending police officers.
-
offence recognition
The recognition of the specific offense being committed to further aid in the investigators thought process when looking for evidence.
-
event classification.
Classify the event as "active" or "inactive" to know whether to conduct a tactical or strategic investigative response.
-
Topic 4: Event Classification and Offence Recognition
When entering an investigation, investigators must be able to identify two important situational elements to aid in the investigative process: Event classification and Offence Recognition.
-
Considering the possible crime being committed in the event
Offence recognition
-
Is it an active event in progress that requires immediate and decisive tactical actions; or is it an inactive event where a less urgent, slower, and more strategic approach can be taken?
Event Classification
-
Topic 3: Distinction Between a Tactical Investigative Response and a Strategic Investigative Response
Criminal events fall into two categories, "active" and "inactive". An active event, where a crime is actively being committed, requires a tactical investigative response from an officer on the front lines. Once the event becomes inactive, after the scene is brought under control, an investigator will conduct strategic investigative response.
It is important to understand these two types on response as they require different protocols and legal proceedings.
-
Strategic Investigative Response
Once the investigator has arrived on scene and the event is under control (event is now "inactive" and Level One Priorities are met). In court, police investigators will have to explain their thinking process based on information they were given and whether they felt the need to take action.
-
Tactical Investigative Response
Pertains to "active" events where operational officers take action (by using force, making an arrest, etc) as a front-line response to criminal events. In these scenarios, there is limited information at hand but critical decisions must be made. If an officer takes action, they are accountable for said action and may have to explain their reasoning for doing so in court.
-
Topic 2: Progression of the Investigative Process
Criminal investigations may change wildly and in unpredictable ways. As such, methodologies pertaining to the investigative process must be sufficiently flexible while also ensuring that results and priorities are met.
When conducting an investigation - the progression from initial evidence gathering to the arrest and charge of a suspect - the results and priorities sought after in an investigation will always be the same.
-
These include collection, analysis, theory development and validation, suspect identification and forming reasonable grounds, and taking action to arrest, search, and lay charges.
The steps to the investigative process.
Criminal incidents are dynamic and unpredictable. As such, the rules to conducting an investigation must be general in nature and flexible.
These steps ensure that, in spite of the unpredictable nature of a criminal investigation, all necessary milestones are hit to ultimately lead to the arrest and charge of a suspect.
-
And, you should always keep the desired results in mind to provide focus and priority to the overall investigative process.
When conducting an investigation, it is important to keep your priorities straight; distinguishing from priorities and results will ensure that an investigation is conducted in a manner that will not compromise it's integrity or validity.
-
priorities
AKA "Level One priorities"
The protection of lives and safety of people, including first responders. Level One priorities will always supercede Level Two priorities (results). It is justifiable to prioritize a Level One priority at the expense of a Level Two priority.
-
results
AKA "Level Two priorities"
These come after "Level One priorities" (just called "Priorities") have been ensured. Under no circumstances will Level Two priorities come at the expense of Level One priorities.
There are 4 general results which are considered equal to each other, meaning that it may be justified to concentrate on one result at the expense of another. 1. Identifying, gathering, and preserving evidence 2. Establishing reasonable grounds to identify and arrest suspects 3. Accurately recording and documenting the event in notes and reports 4. Protecting property
-
The Distinction Between Investigative Tasks and Investigative Thinking
Investigative tasks are concerned with the act of actually gathering the information. Investigative thinking is the analysis of this information to develop theories based on it.
-
Investigative Thinking
The analysis of information and development of theories of what happened.
-
Investigative Tasks
The collection of evidence and information information gathered in investigative tasks is to be later processed, or "chewed on" during investigative thinking
-
- Jun 2024
-
Local file Local file[No data]34
-
Outsourcing of the various components of the infrastructure of an organizationis only part of supply chain management. Successful management of the supplychain will rely on strategic partnerships and may also extend to joint-venturearrangements.
what supply chain management actually is
-
Supply chainmanagement and risk management are interrelated.
when you outsource you now have to worry about both your risks and whoever else is involved in outsourcing
-
thepotential downside of outsourcing needs to be identified and mitigated with thesame level of diligence as the upside or assumed benefit of outsourcing is
essence of supply chain management
risks of outsourcing should be considered just as much as the benefits of it
-
There may be quality and availability issues that could causedissatisfaction amongst fans and result in reduced sales. There are also questionsof corporate social responsibility that need to be addressed.
examples of risks related to the supply chain
-
adequate attention to risk management matters can reduce thelikelihood and magnitude of any disruption to supply
supply chain management reduces risk to supply chain
-
definition of supply chain
the process of that starts by sourcing raw materials and ends with the delivery of product to end users. The supply chain includes all aspects of this process such as vendors, manufactures, factories, warehouses, etc.
-
Typically, internal controls have the following purposes:safeguard and protect the assets of the organization;ensure the keeping of accurate records;promote operational effectiveness and efficiency;adhere to policies and procedures, including control procedures;enhance reliability of internal and external reporting;ensure compliance with laws and regulations;safeguard the interests of shareholders/stakeholders.
purposes of internal controls
all of these help the organization achieve their objectives in some way or another
-
how seriously aparticular department takes risk management and internal contro
relation of internal controls to risk assurance and the audit committee
the internal auditor should have the answer to this question
-
The audit committee will seek assurance that all of the significant risksare being adequately managed and that all of the critical controls are effectiveand that they have been efficiently implemented
risk assurance is the assurance that risks are managed and that controls and implementation thereof are effective
-
The audit committee is concerned with internal control
monitors the use and effectiveness of internal controls
-
Although the audit committee may be considered to be the guardian ofcompliance within the organization, the terms of reference are usually muchbroader than just compliance
audit committee functions: ensure compliance evaluate governance standards advocate for risk management
-
udit committee consists of non-executive directors, with senior executive directors in attendance at auditcommittee meetings
audit committee is meant to be objective facilitates the evaluation of activities in the organization and it's board
-
Control environment
the measure of an organization's risk culture a good control environment is indicative of future success with implementation of risk management and internal control activities
-
enable directors to drive the organization forward
internal controls overlap with governance
-
When designing effective internal controls, the organization should look at thearrangements in place to achieve the following:maintenance of reliable systems;timely preparation of reliable information;safeguarding of assets;optimum use of resources;preventing and detecting fraud and error.
Outcomes of effective (use of) internal control(s)
-
internal control
The system(s) in place that ensure a business meets its objectives. These include managerial actives that facilitate the direction of actions that increase the chance of objectives being achieved.
-
The principles require the equitable treatment of all stakeholders and aninfluential role for stakeholders in corporate governance. Finally, the principlesrequire disclosure and transparency
stakeholder treatment and influence, and transparency are essential parts of governance
-
The group is subject to certain risks
lists the 4 major risks posed towards their company and some mitigation strategies
-
risk control and monitoring,
Is a risk acceptable? if not then develop contingency plans loss scenarios are to be investigated and documented
-
The management
identify, analyze, evaluate, respond, monitor, and communicate risks that relate to said manager's domain compares levels of risk against predefined risk appetite
-
risk management process
identification, evaluation, management measures, control, and review/lessons learned
-
The business impact analysis has three clear purposes
- Establish a time frame for the recovery of mission-critical activities
- Define resource requirements for remediation and their impact potential
- Determine whether the impact is within the risk appetite to determine further response.
-
business impact analysis (BIA)
Assesses the impact of interruption from each critical function. Required to identify the continuity stages of each function. Emphasis is on the importance of a function rather than what could influence it (that is what risk assessments are for)
-
Establish the impact potential and the resource requirements for recoverywithin the agreed timescale.
We are reduced to x% functionality, if we want to get to y% by the agreed date, we will need these resources
-
the emphasis of a BIA is the identification of the relative importance andcriticality of each function, rather than identifying the events that couldundermine that particular function.
A business impact analysis (BIA) will identify the criticality of a function while a risk assessment will identify events that could undermine said function
-
BCP should be viewed ashaving three components
Three components of BCP: 1. Activate crisis management plan. Respond to crisis and make stakeholders aware of situation. 2. Implement disaster recovery plan. Restore infrastructure in a capacity that allows for minimum required functionality for organizational operation. May overlap with first component. 3. Work to restore full functionality
-
hird and broader operational issue ofbusiness continuity
working towards full recovery
-
DRP and BCP can be considered to be responses for when the event occurs andthey do not take into account how likely it is that the event will occur.
proactively making a plan for reactive measures
-
Disaster recovery plan
plan for restoring organizational infrastructure in the event of a crisis
-
BCP is how an organization prepares for future incidents thatcould jeopardize its existence
definition of BCP
the identification of potential threats to a business, their impacts, and a plan for responding to such scenarios
-
disadvantages
delays in obtaining settlement disputes on extent of coverage potential for being over or under insured
-
advantages
reduces uncertainty regarding hazard risks may save money because losses could be greater than insurance premiums can provide access to specialist services through insurer
-
hird-party insurance
insurance provider pays for losses suffered by the victims of the activities of the insured
-
irst-party insurance
insurance providers pays for losses suffered by insured
-
-
www.cgi.com www.cgi.com
-
Kevin Mitnick
based
-
-
www.techtarget.com www.techtarget.com
-
Cybersecurity governance
Senior officials from the organization promoting good cyber hygene, see 6 steps
-
- May 2024
-
Local file Local file[No data]20
-
there are three zones onthe risk matrix
Comfort: low-likelihood/low-impact events Cautious & Concerned: acceptable variability of the level of risk, risk tolerance Critical: outside tolerance limits
-
There is a clear hierarchy of effectiveness of controls that is represented by theorder preventive, corrective, directive and finally detective.
Preventative provides the most control while Detective provides the least control
-
Description of types of hazard controls
Preventative: Limit the possibility of an undesirable event happening. Preventative controls become more important with the priority to prevent a certain outcome. Most controls implemented in response to hazard risks fall under this.
Corrective: Reduce the impact of any outcomes that have already been realized and remedy risk exposure. Treatment is focused on making the risk less likely to occur and/or the impact is reduced.
Directive: Give directions to people in an effort to ensure a particular outcome is achieved and loss is prevented. Examples include training on how to respond to a specific event. Similar to processes in PPT.
Detective: If an outcome has already been realized, detective controls figure out when and how. The goal is to ensure that circumstances do not deteriorate further or happen again
-
risk response as the mainheading then gives rise to the options of tolerate, treat, transfer and terminate
the 4 T's falls under risk response
-
organization may not be able toterminate or eliminate the risk entirely and thus will need to implementalternative control measures
basically just working to move the risk to the tolerable quadrant through the use of T's that are adjacent to terminate
-
Risk hedging or neutralization maytherefore be considered to be a risk transfer option, as well as a risk treatmentoption
there is overlap between the 4T's, I imagine that distinction comes when looking at likelihood/impact and type of control used
-
Actions to improve the standard of risk control
employee training, security cameras, redundant backups, etc
-
when the risk has been treated, thenew current level or target level may become tolerable
so does this mean that implementing controls is a form of risk treatment?
-
one riskis balanced against anothe
In the summer we'll use our factories to make swimsuits and in the winter we'll make mittons
-
tolerate a risk and the concept of risk tolerance
To tolerate a risk means to accept and retain it, even if it is more risky than the organization would like (We may lose 40k in product but it would cost more to replace it so we're just not going to)
The concept of risk tolerance is the range of risk that is acceptable (We've prepared ourselves so that we're comfortable with up to 20k in losses)
-
Control effort seeks to move the risk to the low-likelihood /low-impact quadrant of the risk matrix
the point of controls are to ultimately move risk to a tolerable level
-
organization may decide to tolerate risk levels that are high
if the benefit is high and in alignment with the organization's goals
-
bear the risk after risk treatment
residual risk
-
The 4Ts of hazard risk management
Tolerate: No further action is taken. The exposure is either tolerable or the cost of taking action is disproportionate to any benefit gained. | low likelihood / low impact
Treat: Action is taken to reduce the risk back down to a tolerable level. | high likelihood / low impact
Transfer: A third party to takes on the risk. Cyber insurance is the most common example of this. | low likelihood / high impact
Terminate: The only way to achieve an acceptable level of risk is to completely stop the activity. | high likelihood / high impact
-
dominant response in relation to each of the4Ts, according to the position of the risk on a risk matrix
the "T" that you use is dependent on the location of said risk when graphed on a risk matrix
-
For hazard risks, the range of responsesavailable is often described as the 4Ts.
4Ts generally just applies to hazard risks then
-
significance
in terms of priority significant risk
-
In simple terms, a risk management standard is the combination of adescription of the risk management process, together with the recommendedframework
What is a risk management standard?
-
four categories
I think these are the program management outcomes
-
An event with the ability to impact (inhibit, enhance or cause doubt about) the effectiveness andefficiency of the core processes of an organization
The book's definition of risk
-
-
www.fairinstitute.org www.fairinstitute.org
-
Finally, extreme risk exceeding the ‘confidence level’ is managed under the approach of ‘self-insurance’
like how boise state parking will account for x many spots being taken up by trespassers when deciding how many permits to give out
-
-
www.itbusinessedge.com www.itbusinessedge.com
-
The three disciplines – IT security, risk management and business continuity – are now beginning to converge in the way that they analyze, identify and evaluate threats and risk when it comes to the common goal of continuity and resilience in business operations.
3 separate things beginning to melt together into the larger cyber security pot
-
-
inst-fs-iad-prod.inscloudgate.net inst-fs-iad-prod.inscloudgate.net
-
mitigation of risk.
mitigation actions are traced using the plan of action milestones The controls are then reassessed to determine remediating efficacy. Assessment reports and security and privacy plans are updated accordingly
-
acceptance of risk
The authorizing official determines what amount of risk can be accepted based on how well the organization can deal with risk (I think?) Prioritization (I call this triaging) of risk is crucial to this form of risk response. From prioritizing risk, you can then determine an acceptable amount of residual risk
-
reassess the controls
basically the monitor and refine phase
-
-
nvlpubs.nist.gov nvlpubs.nist.gov
-
risk response strategies
specific guidelines for responding to risk in the context of the risk type and organizational goals navigating risk response in a ways threat does inadvertently harm the organization
-
explicit and transparent the risk perceptions that organizations routinely use in makingboth investment and operational decisions
RM strategies give a guide for how organizations address risk
-
-
www.theirm.org www.theirm.org
-
risk tolerance
The amount of risk the organization can deal with. This can be expressed with quantitative numbers like money lost.
-
risk appetite
The pursuit of risk in terms of the organization's goals and methods of achieving them
-
Principles and approach
Key Principles: 1. Risk appetite can be complex so it is best to address said complexity 2. Risk appetite must be measurable in a way that directors and stakeholders can understand. 3. Risk appetite is dynamic, changing in range and breadth based on organizational goals 4. Risk appetite should be developed within the context of the capabilities of the organization. These capabilities are influenced by the culture and resources of the organization. 5. Risk appetite should be addressed throughout every aspect of the organization 6. Risk appetite is influenced by the organization's propensity to take risk and exercise control
-
-
nvlpubs.nist.gov nvlpubs.nist.gov
-
If a risk materializes that is closely related to multiple risks, it is likely that a cluster of risks willmaterialize at or near the same time.
risks that are closely related may snowball into each other priority is then based on the likelihood of said risks actually materializing
-
total impact to organizations
takes into account the CIA triad/impact from it's fracture
-
decide whether a criticalmission/business need today warrants jeopardizing the future capabilities of the organization
prob needs stakeholder input
-
risk prioritization that is based on current and future organizational needs
previous questions define base for risk prioritization weighing current and future impact to the organizations
-
When too many risks are clustered at or about the samevalue, organizations need a method to refine the presentation of risk assessment results,prioritizing within sets of risks with similar values, to better inform the risk response componentof the risk management process
A method is needed to take risks and respond to them in a way that can be easily repeated and understood
-
Prioritization
Triage of risk because there is a lot of it
-
-
nvlpubs.nist.gov nvlpubs.nist.gov
-
RISK RESPONSE
Respond to findings from the monitor phase in accordance to the organization's risk tolerance. This control stresses the importance of defining appropriate responses to risks before generating a plan of action.
-
-
www.thesslstore.com www.thesslstore.com
-
Identify the Potential Impact
Identify the harm to assets and the potential impact of them being...harmed
-
Identify the Likelihood Such Attacks Would Succeed
how likely a threat will attempt to be exploited, how likely the exploitation will succeed, and how likely there will be negative impact from said exploitation
-
Identify Vulnerabilities and the Conditions Needed to Exploit Them
define what vulnerabilities you have and how exploitable they are
-
Identify Threat Events
come up with every threat you can think of, divided into adversarial and non-adversarial then compile them into criticality
-
You can’t prepare for threats that you didn’t anticipate
not completely true hahaha
-
Identify and Document Threat Sources
Find adversarial and non-adversarial threats assess them in terms of things that COULD happen
-
define parameters
scope and the 3 parts of context
I assume that the answers to the questions should be ones that non-industry pros could understand
-
You may want to start with a data audit
what data you're protecting, how you're protecting it, and how it's being stored
-
So this cyber risk assessment will serve as a sort of executive summary to help those parties make informed decisions about security
key is to make it relevant to BoD and Stakeholders who may not be tech-savvy
-
And you have to be careful when you’re looking for advice on performing a cyber risk analysis, because if you forget the word “cyber” you end up in a land of industrial manufacturing accidents and death & dismemberment clauses.
Indicates that CRMs are still relatively new and not as high of a concern when compared with traditional ideas of "risk"
-
-
aaahq.org aaahq.org
-
Organizations that are faced withalternative objectives seek to understand the shapeand height of a curve for a potential businessobjective
the level of risk they can tolerate for a given scenario and it's objective
-
The board of directors is responsible for providing risk oversight of enterprise risk managementculture, capabilities, and practices.
a team of senior members that oversee all tasks related to risk within their field
should contain diverse skillsets and backgrounds and have strong leadership skillz
generally has some lebel of expertise in whatever field they're "directing"
-
-
blog.netwrix.com blog.netwrix.com
-
along with the governance model that will determine who will be responsible for each area of the ISRM strategy
Falls under GRM
-
-
securityintelligence.com securityintelligence.com
-
Aligning stakeholders
Make sure the stakeholders have an understanding of what the IRM program does and how it aligns with thier goals
-
To cope with an ever-increasing number of regulations, these programs streamline security processes and workflows so that compliance is a byproduct
being healthy and happy are byproducts of brushing your teeth, working out, and eating good foods
-
Mapping policies and standards to an industry-recognized comprehensive framework is more important than adopting any particular framework
every company has different goals so the use of frameworks should be tailored to fit those goals franken-framework???
-
taxonomies
An ordered arrangement of groups or categories
-
IRM programs select roles for targeted efforts based on their level of policy compliance and the amount of harm their behavior can cause
why the sales rep is a cog in the greater cybersecurity machine
-
IRM programs also find ways to identify employees who exhibit desired behaviors and reward them with praise or tokens of appreciation
whoever has the least failed phishing tests gets a gift card
-
Campaigns based on the psychological drivers of end user behavior are much more likely to result in lasting behavior change.
Ashley Rose in the first video talks about this Remembering your first college party vs the last test they took
-
the institution of relatively modest incentives for secure behavior, even limited to praise and token rewards, will have a greater impact on behavior than additional investments in training and communication.
security-oriented company culture
-
Still, successful programs use failure modes as a systematic means to identify the relevant risks.
asset 1 is very important to us, how could it fail?
-
By analyzing close calls in addition to loss events, high-performing IRM programs dramatically increase their collection of incident data for understanding threat and vulnerability patterns.
can identify patterns of risky behavior
-
IRM programs invest in monitoring and analysis to identify emerging risks and mitigate them proactively.
proactive and preemptive response to risk as opposed to reactive
-
Innovative tactics work by finding pragmatic substitutes for actuarial data and identifying observable aspects of business operations that can serve as warning signals for likely changes in risk exposure
find ways to measure risk in a meaningful way, then use that data effectively
-
mobilizing against challenges just over the horizon.
resiliency
-
-
Local file Local file
-
Retention
comparison between the amount of risk transferred via insurance vs the amount of risk retained
risk retention is inversely related to the cost of risk insurance
-
Theyintroduce a twin‐tier approach with a first tier being the correlation of cyber risks within a firm(e.g., correlated failure of multiple systems on its internal network). The second tier refers tothe correlation at a global level meaning correlation across independent firms in an insurer'sportfolio. Local cyber loss events such as an insider attack (high internal, low global correla-tion) are easier to insure than global loss events because the necessary premium for global lossevents would be extremely high due to the lack of diversification opportunities.
Internal: stuff that goes wrong within a firm
External: stuff that goes wrong that effects a firm's clients and third parties (I think??)
-
actuarial
statistics, particularly relating to insurance
-
Transfer
This part is very heavy on the use of cyber insurance It goes into a lot insurance stuff that kinda just went over my head
-
Mitigation
Proactively mitigate risk by analyzing main security concerns and how to satisfy them
Also goes into detail on how to properly invest in information security by comparing each investment with the value of the risk (I still don't understand how this is done)
-
four security issues (“access to informationsystems, secure communication, security management, and development of secure informationsystems”) and related techniques (password and biometrical authentication; cryptographictechniques; key management, virtual private networks, and programming language security)
Technical mitigations defined by established security considerations and their associated techniques
-
Parkerian hexad
Like the CIA triad but more detailed, containing 6 pillars as opposed to the original 3
-
Avoidance
Avoiding risk wherever possible This treatment is not as relevant today because it isn't resilient-focused (I think)
They use the example of requiring security policies of IoT devices bc they're usually cheap They also say that this example could be under mitigation
-
The estimated likelihood and potential impact are used to determine the appropriate treatment,which includes avoidance, mitigation to reduce likelihood and/or potential impact, transfer, andretention.
The proper treatment for a cyber incident is determined by: the likelihood of the event the potential impact of said event
The three types of treatments are: Avoidance Mitigation to reduce likelihood/potential impacy Transfer Retention
-
One way to classify and identify cyberattacks is whether they affect the “con-fidentiality, availability or integrity of information or information systems”
The CIA triad
-
This section summarizes, in chronological order, the discussions surrounding cybersecurity issues inthe early days and how cyber risk was eventually identified as one of the major risk categories facingorganizations
gives historical account of how cyber risks have been identified
-
- Apr 2024
-
www.mitre.org www.mitre.org
-
promulgation
noun
the act of making a law or decree known, or formally putting it into effect, by public declaration: Upon adoption, signing, and promulgation of these provisions in the established procedure, they acquire the power of law.
the act of publicly teaching or setting forth an idea, doctrine, etc.: The systematic study of parasites began with the promulgation of the germ theory.
-
metric descriptor
Short phrase describing what the metric does and what it measures
-
Similarly, a few metrics in thecatalog were defined from the cyber resiliency design principles
ST-#-#
ST: structural design principle metric first number is number of said design principle
-
A few metrics in the catalog were defined from cyber resiliency techniques and approaches.These have identifiers of the form TE-AP-#
TE-AP-#
TE: technique AP: approach #: number assignment
-
metric identifier
generally formatted as: OO-S#-A#-# ex. PA-S1-A2-2
OO: any one of the cyber resiliency objectives; A for Prevent/Avoid, PR for Prepare, CN for Continue, CS for Constrain, RE for Reconstitute, UN for Understand, TR for Transform, and RA for Re-Architect.
S# and A# are the sub objective and activity, respectively
The last space is to assign a number to the objective
-
catalog entries include information about cyber resilient TTP's and accompanying information about them
-
-
Local file Local file
-
Finally,depending on how an organization has defined or articulated its risk management strategy, the selectionand tailoring of cyber resiliency design principles can be driven by that strategy.
design principles are driven by organization goals and risk management strategy
-
Representative environmental factors
determine which design principles are used, how to use them for the target environment, and how to describe said design principles
-
Re-Architect is supported by most of the strategic design principles, and (inconjunction with the organization’s risk management strategy) drives the selection of structural designprinciples
re-architect is supported by strategic design principles and drives structural design principles
-
Prepare involves creating and maintaining aset of realistic courses of action, which are based on the architecture, design, and implementation, ratherthan driving them.
Prepare comes as a result of arch, des, and impl
-
-
Local file Local file
-
Most of these frameworks provide somesubjective guidance from different angels of resilience studyand lack of clear explanation on the quantitative resiliencemetrics formulation
reason for this paper
-