188 Matching Annotations
  1. Last 7 days
    1. Admitit.Thisisthepoemyouwantedallalong

      the poem you were expecting him to write? or the poem you've always been waiting to read?

    2. Just kidding I never think.

      italics is tommy pico, communicates with teebs

    3. I can’t write a nature poem be English is some Stockholm shit,makes me complicit in my tribe’s erasure —why shd I give a fuck abta“poetry’? It’s a containerfor words like whilst and hither and tamp. It conducts something ofpermanent and universal interest. Poems take something like an apple,turn it into the skin, the seeds, and the core. They talk abt gravity, abtAdam, and Snow White and the stem of knowledge.

      battles with his relationship as an english speaking poet and being an ndn

    4. People r so concerned abt “the Earth”in the sense of kale salad and bruisedgilShe'll be just fine. We might not make it, hopefully. We’ll exhaustourselves soon what with global population blooms and SanLoco macho nachos and ruddy from frozen margaritas you reach formy arm. You drifted off again. You ask, What are you thinking about?

      goes against what a lot of nature poems are about

      saying that the earth will be fine it's just the human race that'll die out

    5. I don’t like thinking abt nature be nature makes me suspect there is a god.

      VERY personal

      something that I empathize with a lot nature threatening you with the existence of god

    6. Winter is a death threat from nature, and I don’t respond well to predation —it’s not like summer, death in the form of barking mentakin issue w/the short shorts and the preen and the queenly holdinghandsgod forbid u step into the gnashing cold for a fizzy water and grapes,

      poetic and nature

      meter + sibilance

    7. My primary device is personification, says Nature. Do your associationsconsider my mercurial elements?

      Nature

      in poetry we personify nature a lot, this also builds off the other one I highlighted about nature threatening you with the existence of god

    8. We are the last animal to arrive in the kingdom —even science will tellyou that.My father takes me into the hills we cut sage. He tells me to thankthe plant for its sacrifice, son. Every time I free a switch of it a burst ofprayer for every leaf.I’m swoll on knowing this? Sharing the pride of plantsMy mother waves at oak trees. A doctor delivers her diagnosis.When she ascends the mountains to pick acorn, my mothermotherfucking waves at oak trees. Watching her stand there, herhands behind her back, rocking, grinninginto the face of the bark

      nature

    9. I look too much into the mirror of my worst selfso life feels like always breakin in a pair of new shoesand my hunch is we'll be naked soon having sex like those handsoapsthat smell like parsley sort of refreshing but chemical Nothing like thereal thing n you wd prolly notice if we fucked with all my clothes onbe yr of course so hazeland stupid.Nothing can fall that wasn’t builtexcept maybe my self-esteem be I have a hunch that I was born with itintact but then America came smackedme across the face said like itn the sick thing is getting smacked across the face makes me so wet rnand that’s prolly why poetry, be in order to get insidea poem has to break youthe way the only thing more obvious than your bodyis leaving yr shirt on in the pool

      Tone

      goes with the rambling style of prose that he keeps using

    10. I like the way my head shiversrestin on yr stomach when you say IfIkeep hanging out w/u I’m gonnaget a six packfrom laughing.

      personal

    11. Grief is sneaking cigs from the styrofoam cups on the tables next to thecreamers and plates of Mary’s pineapple upside-down cake, running off tothe playground behind the schoolroom trailers to (try and) smoke the

      Poetic

      "Grief is" metaphor

    12. the fabric of our lives #death

      Tone

      all of the #death stuff, mentioned in the blurb

    13. There’s no exposure in Southern California,no clanging heat in San Diego.in LA? The snow comes in a can.

      poetic

      I just really like this passage

    14. “Malibu” by Hole is one of the greatest songs in Americawhen I was younger I thought it was a sexy like summer story abt thesandy aesthetic wonder of aSoCal summer beach townHow you listen to something completely in yr own head.

      Personal

    15. My singing teacher tells me find your centerTornado fucking is a natural phenomenonwherein you start on your stomach,get flipped to the right side,then he slides under you slamsu into his hips, both in a sort of crab walk flip leftbefore returning to (yoga term) stomach pose.

      Tone combines nature with fucking...I think...

  2. Mar 2025
    1. we can find the words to describe

      similar to the first step of activism - getting people to become aware of the issue and think about it - you can't do that without the proper words to describe it

    Annotators

  3. Jan 2025
    1. discuss the difference between applied and theoretical criminology.

      Applied criminology focuses on reducing crime through actionable means. Theoretical criminology seeks to explain criminal behavior by developing and refining theories.

    2. explain the difference between determinism and positivism.

      Determinism and positivism are two frameworks that attempt to explain human behavior. Determinism argues that it is influenced by factors outside of one's control. Positivism, on the other hand, asserts that, through scientific observation, human behavior can indeed be studied and understood.

    3. restate the tenets of rational choice theory

      In the field of criminology, rational choice theory suggests that individuals engage in crimes they believe are a low risk activity through comparing the benefits of committing a crime with the risks of getting caught.

    4. define determinism

      Determinism is a theoretical framework in criminology that suggests human behavior is influenced by factors beyond individual control.

    5. Identify variables used during social science inquiry

      The variables used during social science inquiry are socioeconomic status, education, and environment.

    6. summarize the history and evolution of criminology. recognize those contributions to the discipline made by Edwin Sutherland.

      Edwin Sutherland work, emphasizing the role of socialization in the development of criminal behavior, has been a key contribution to the role of criminology. Criminology has evolved to become more nuanced, with multiple frameworks emerging to explain why and what types of individuals commit crimes.

    7. describe the work of criminologists.

      Criminologists aim to advance the understanding of crime through research-based methods. Through identifying variables that contribute to crime, criminologists develop and apply theories to explain why individuals engage in crime.

    8. discuss the difference between criminal justice and criminology

      While criminology is the study of crime and criminals, criminal justice refers to methods established by the government that are used to prevent, deter, and control crime.

    9. define criminology

      Criminology is a field of study that focuses on analyzing crime and criminals to understand why crime happens, what types of people are prone to criminal action. Research is used to find ways to promote social justice and prevent crime from happening.

    1. remained destined to strike a single match

      referring to a moment of destruction, some singularity leading to some apocalyptic event

    2. paradise

      a lot of religious references, with prophets, the same hand, paradise, potentially the 12 prophets

    3. 12th

      perhaps a nod to the 12 prophets of islam?

    4. nightingale

      nightingales are significant to poetry John Keats' "ode to a nightengale"

    5. The 12th nightingale arrived like a prophet in a cloud of smoke

      wtf does this mean

    6. cardboard orchard

      cardbOard, ORchArd

    7. bees on budding flowers.

      alliteration

    8. translation of Haji Khavari

      translated from farsi

    9. scent of hot plastic.

      contrasts with "budding flowers" and "lemon trees"

    10. The 3-D printer worked overtime sculpting lemon trees complete with bees on budding flowers.

      plastic making beautiful examples of nature

    11. lemon trees

      lemon trees represent a lot of stuff

    12. a paradise of paper.

      is he referring to trees?

    1. Additionally, Equifax reported that it would provide several services to allU.S. consumers, regardless of whether their information had beencompromised, free of charge for one year.

      Frank Abagnale's video talked about why this was a bad idea- most stolen PII isn't even used for at least like 3 years

    2. After additional analysis, including a determination that thequery had, in fact, allowed the attackers to access PII from approximately2.5 million additional U.S. consumers, Equifax revised the number ofaffected individuals from 143 million to 145.5 million on October 2, 2017.

      going under my "royal fuckups" header for notes on this case study

    3. Equifax Identified SeveralFactors That the AttackerExploited During theBreach

      According to Equifax, the key factors for why they got breached were failures in identification, detection, segmentation, and data governance.

    1. Topic 7: Rules of Engagement for an Active Event or an Inactive Event

      When arriving on scene, the investigator must be able to classify the event and discern what, if any offence has been committed.

      Based on the type of offence and the classification of the event, the law provides certain powers for taking action. Officers must know the law when taking action and entering a property.

    2. More on Offence Recognition

      Officers need to be able to recognize if and what offence is taking place while also trying to classify the event.

      Knowing what offence has taken place is important because the investigator will then know what type of evidence they need to look for and under what circumstances can they enter an property legally.

    3. As part of attendance to the scene of the event

      While on the scene of the event, the investigator has to know the legal grounds to which they are able to enter the property: * consent of the property owner * obtain a warrant * exigent circumstance * in active pursuit of the suspect

    4. If the investigator determines that they are attending to an Active Event

      If the investigator determines that the event is active and the offence poses a threat to Level One Priorities, then they know that they can make an arrest if they can find evidence to support reasonable grounds to do so.

    5. Having an offence in mind, the investigator will also begin to consider their range of powers and authorities that can be used under the law regarding that offence.

      If an officer suspects that a crime has been committed, they need to discern whether they need to catch the suspect in the act (summary conviction) or if there is already enough evidence (indictable/dual procedure) to make an arrest.

    6. Police officers may be called to action by many different means.

      When called on scene, a police officer will have to determine if the event taking place is active or inactive. If it is active, thus requiring a tactical investigative response, they need to discern if there is a threat to Level One Priorities.

      Because information is limited in these scenarios, the law allows for "exigent circumstances" - scenarios in which an officer can rely on certain powers to protect Level One Priorities.

    7. exigent circumstances

      circumstances predetermined by law for when an officer can enter a property and make an arrest without a warrant

      active event + explicit or implied threat to life or safety = exigent circumstances

    8. Topic 6: Threat vs. Action Analysis Dilemma

      This dilemma arises when a crime is actively being committed that presents a direct threat to the safety of others. For example, an active shooter scenario poses this dilemma because the responding officer must weigh the available information and decide if they should respond or wait for backup.

    9. An Inactive Event

      Requires a Strategic Tactical Investigative Response 1. The criminal act has concluded at the scene. 2. The suspect or suspects have left the scene or have been arrested or detained. 3. The situation at the scene no longer represents a danger to the life or safety of a person, including police officers.

    10. Topic 5: Classifying the Event as Either an Active Event or an Inactive Event

      When at the scene of an event, the investigator must always assume that the event is inactive until proven otherwise. Knowing if an event is active or inactive is imperative to deciding further action.

    11. An Active Event

      Requires a Tactical Investigative Response 1. The criminal act is or may still be in progress at the scene. 2. The suspect is or may still be at the scene of the event. 3. The situation is, or may be, a danger to the life or safety of a person, including the life or safety of attending police officers.

    12. offence recognition

      The recognition of the specific offense being committed to further aid in the investigators thought process when looking for evidence.

    13. event classification.

      Classify the event as "active" or "inactive" to know whether to conduct a tactical or strategic investigative response.

    14. Topic 4: Event Classification and Offence Recognition

      When entering an investigation, investigators must be able to identify two important situational elements to aid in the investigative process: Event classification and Offence Recognition.

    15. Considering the possible crime being committed in the event

      Offence recognition

    16. Is it an active event in progress that requires immediate and decisive tactical actions; or is it an inactive event where a less urgent, slower, and more strategic approach can be taken?

      Event Classification

    17. Topic 3: Distinction Between a Tactical Investigative Response and a Strategic Investigative Response

      Criminal events fall into two categories, "active" and "inactive". An active event, where a crime is actively being committed, requires a tactical investigative response from an officer on the front lines. Once the event becomes inactive, after the scene is brought under control, an investigator will conduct strategic investigative response.

      It is important to understand these two types on response as they require different protocols and legal proceedings.

    18. Strategic Investigative Response

      Once the investigator has arrived on scene and the event is under control (event is now "inactive" and Level One Priorities are met). In court, police investigators will have to explain their thinking process based on information they were given and whether they felt the need to take action.

    19. Tactical Investigative Response

      Pertains to "active" events where operational officers take action (by using force, making an arrest, etc) as a front-line response to criminal events. In these scenarios, there is limited information at hand but critical decisions must be made. If an officer takes action, they are accountable for said action and may have to explain their reasoning for doing so in court.

    20. Topic 2: Progression of the Investigative Process

      Criminal investigations may change wildly and in unpredictable ways. As such, methodologies pertaining to the investigative process must be sufficiently flexible while also ensuring that results and priorities are met.

      When conducting an investigation - the progression from initial evidence gathering to the arrest and charge of a suspect - the results and priorities sought after in an investigation will always be the same.

    21. These include collection, analysis, theory development and validation, suspect identification and forming reasonable grounds, and taking action to arrest, search, and lay charges.

      The steps to the investigative process.

      Criminal incidents are dynamic and unpredictable. As such, the rules to conducting an investigation must be general in nature and flexible.

      These steps ensure that, in spite of the unpredictable nature of a criminal investigation, all necessary milestones are hit to ultimately lead to the arrest and charge of a suspect.

    22. And, you should always keep the desired results in mind to provide focus and priority to the overall investigative process.

      When conducting an investigation, it is important to keep your priorities straight; distinguishing from priorities and results will ensure that an investigation is conducted in a manner that will not compromise it's integrity or validity.

    23. priorities

      AKA "Level One priorities"

      The protection of lives and safety of people, including first responders. Level One priorities will always supercede Level Two priorities (results). It is justifiable to prioritize a Level One priority at the expense of a Level Two priority.

    24. results

      AKA "Level Two priorities"

      These come after "Level One priorities" (just called "Priorities") have been ensured. Under no circumstances will Level Two priorities come at the expense of Level One priorities.

      There are 4 general results which are considered equal to each other, meaning that it may be justified to concentrate on one result at the expense of another. 1. Identifying, gathering, and preserving evidence 2. Establishing reasonable grounds to identify and arrest suspects 3. Accurately recording and documenting the event in notes and reports 4. Protecting property

    25. The Distinction Between Investigative Tasks and Investigative Thinking

      Investigative tasks are concerned with the act of actually gathering the information. Investigative thinking is the analysis of this information to develop theories based on it.

    26. Investigative Thinking

      The analysis of information and development of theories of what happened.

    27. Investigative Tasks

      The collection of evidence and information information gathered in investigative tasks is to be later processed, or "chewed on" during investigative thinking

  4. Jun 2024
    1. Outsourcing of the various components of the infrastructure of an organizationis only part of supply chain management. Successful management of the supplychain will rely on strategic partnerships and may also extend to joint-venturearrangements.

      what supply chain management actually is

    2. Supply chainmanagement and risk management are interrelated.

      when you outsource you now have to worry about both your risks and whoever else is involved in outsourcing

    3. thepotential downside of outsourcing needs to be identified and mitigated with thesame level of diligence as the upside or assumed benefit of outsourcing is

      essence of supply chain management

      risks of outsourcing should be considered just as much as the benefits of it

    4. There may be quality and availability issues that could causedissatisfaction amongst fans and result in reduced sales. There are also questionsof corporate social responsibility that need to be addressed.

      examples of risks related to the supply chain

    5. adequate attention to risk management matters can reduce thelikelihood and magnitude of any disruption to supply

      supply chain management reduces risk to supply chain

    6. definition of supply chain

      the process of that starts by sourcing raw materials and ends with the delivery of product to end users. The supply chain includes all aspects of this process such as vendors, manufactures, factories, warehouses, etc.

    7. Typically, internal controls have the following purposes:safeguard and protect the assets of the organization;ensure the keeping of accurate records;promote operational effectiveness and efficiency;adhere to policies and procedures, including control procedures;enhance reliability of internal and external reporting;ensure compliance with laws and regulations;safeguard the interests of shareholders/stakeholders.

      purposes of internal controls

      all of these help the organization achieve their objectives in some way or another

    8. how seriously aparticular department takes risk management and internal contro

      relation of internal controls to risk assurance and the audit committee

      the internal auditor should have the answer to this question

    9. The audit committee will seek assurance that all of the significant risksare being adequately managed and that all of the critical controls are effectiveand that they have been efficiently implemented

      risk assurance is the assurance that risks are managed and that controls and implementation thereof are effective

    10. The audit committee is concerned with internal control

      monitors the use and effectiveness of internal controls

    11. Although the audit committee may be considered to be the guardian ofcompliance within the organization, the terms of reference are usually muchbroader than just compliance

      audit committee functions: ensure compliance evaluate governance standards advocate for risk management

    12. udit committee consists of non-executive directors, with senior executive directors in attendance at auditcommittee meetings

      audit committee is meant to be objective facilitates the evaluation of activities in the organization and it's board

    13. Control environment

      the measure of an organization's risk culture a good control environment is indicative of future success with implementation of risk management and internal control activities

    14. enable directors to drive the organization forward

      internal controls overlap with governance

    15. When designing effective internal controls, the organization should look at thearrangements in place to achieve the following:maintenance of reliable systems;timely preparation of reliable information;safeguarding of assets;optimum use of resources;preventing and detecting fraud and error.

      Outcomes of effective (use of) internal control(s)

    16. internal control

      The system(s) in place that ensure a business meets its objectives. These include managerial actives that facilitate the direction of actions that increase the chance of objectives being achieved.

    17. The principles require the equitable treatment of all stakeholders and aninfluential role for stakeholders in corporate governance. Finally, the principlesrequire disclosure and transparency

      stakeholder treatment and influence, and transparency are essential parts of governance

    18. The group is subject to certain risks

      lists the 4 major risks posed towards their company and some mitigation strategies

    19. risk control and monitoring,

      Is a risk acceptable? if not then develop contingency plans loss scenarios are to be investigated and documented

    20. The management

      identify, analyze, evaluate, respond, monitor, and communicate risks that relate to said manager's domain compares levels of risk against predefined risk appetite

    21. risk management process

      identification, evaluation, management measures, control, and review/lessons learned

    22. The business impact analysis has three clear purposes
      1. Establish a time frame for the recovery of mission-critical activities
      2. Define resource requirements for remediation and their impact potential
      3. Determine whether the impact is within the risk appetite to determine further response.
    23. business impact analysis (BIA)

      Assesses the impact of interruption from each critical function. Required to identify the continuity stages of each function. Emphasis is on the importance of a function rather than what could influence it (that is what risk assessments are for)

    24. Establish the impact potential and the resource requirements for recoverywithin the agreed timescale.

      We are reduced to x% functionality, if we want to get to y% by the agreed date, we will need these resources

    25. the emphasis of a BIA is the identification of the relative importance andcriticality of each function, rather than identifying the events that couldundermine that particular function.

      A business impact analysis (BIA) will identify the criticality of a function while a risk assessment will identify events that could undermine said function

    26. BCP should be viewed ashaving three components

      Three components of BCP: 1. Activate crisis management plan. Respond to crisis and make stakeholders aware of situation. 2. Implement disaster recovery plan. Restore infrastructure in a capacity that allows for minimum required functionality for organizational operation. May overlap with first component. 3. Work to restore full functionality

    27. hird and broader operational issue ofbusiness continuity

      working towards full recovery

    28. DRP and BCP can be considered to be responses for when the event occurs andthey do not take into account how likely it is that the event will occur.

      proactively making a plan for reactive measures

    29. Disaster recovery plan

      plan for restoring organizational infrastructure in the event of a crisis

    30. BCP is how an organization prepares for future incidents thatcould jeopardize its existence

      definition of BCP

      the identification of potential threats to a business, their impacts, and a plan for responding to such scenarios

    31. disadvantages

      delays in obtaining settlement disputes on extent of coverage potential for being over or under insured

    32. advantages

      reduces uncertainty regarding hazard risks may save money because losses could be greater than insurance premiums can provide access to specialist services through insurer

    33. hird-party insurance

      insurance provider pays for losses suffered by the victims of the activities of the insured

    34. irst-party insurance

      insurance providers pays for losses suffered by insured

    Annotators

  5. May 2024
    1. there are three zones onthe risk matrix

      Comfort: low-likelihood/low-impact events Cautious & Concerned: acceptable variability of the level of risk, risk tolerance Critical: outside tolerance limits

    2. There is a clear hierarchy of effectiveness of controls that is represented by theorder preventive, corrective, directive and finally detective.

      Preventative provides the most control while Detective provides the least control

    3. Description of types of hazard controls

      Preventative: Limit the possibility of an undesirable event happening. Preventative controls become more important with the priority to prevent a certain outcome. Most controls implemented in response to hazard risks fall under this.

      Corrective: Reduce the impact of any outcomes that have already been realized and remedy risk exposure. Treatment is focused on making the risk less likely to occur and/or the impact is reduced.

      Directive: Give directions to people in an effort to ensure a particular outcome is achieved and loss is prevented. Examples include training on how to respond to a specific event. Similar to processes in PPT.

      Detective: If an outcome has already been realized, detective controls figure out when and how. The goal is to ensure that circumstances do not deteriorate further or happen again

    4. risk response as the mainheading then gives rise to the options of tolerate, treat, transfer and terminate

      the 4 T's falls under risk response

    5. organization may not be able toterminate or eliminate the risk entirely and thus will need to implementalternative control measures

      basically just working to move the risk to the tolerable quadrant through the use of T's that are adjacent to terminate

    6. Risk hedging or neutralization maytherefore be considered to be a risk transfer option, as well as a risk treatmentoption

      there is overlap between the 4T's, I imagine that distinction comes when looking at likelihood/impact and type of control used

    7. Actions to improve the standard of risk control

      employee training, security cameras, redundant backups, etc

    8. when the risk has been treated, thenew current level or target level may become tolerable

      so does this mean that implementing controls is a form of risk treatment?

    9. one riskis balanced against anothe

      In the summer we'll use our factories to make swimsuits and in the winter we'll make mittons

    10. tolerate a risk and the concept of risk tolerance

      To tolerate a risk means to accept and retain it, even if it is more risky than the organization would like (We may lose 40k in product but it would cost more to replace it so we're just not going to)

      The concept of risk tolerance is the range of risk that is acceptable (We've prepared ourselves so that we're comfortable with up to 20k in losses)

    11. Control effort seeks to move the risk to the low-likelihood /low-impact quadrant of the risk matrix

      the point of controls are to ultimately move risk to a tolerable level

    12. organization may decide to tolerate risk levels that are high

      if the benefit is high and in alignment with the organization's goals

    13. bear the risk after risk treatment

      residual risk

    14. The 4Ts of hazard risk management

      Tolerate: No further action is taken. The exposure is either tolerable or the cost of taking action is disproportionate to any benefit gained. | low likelihood / low impact

      Treat: Action is taken to reduce the risk back down to a tolerable level. | high likelihood / low impact

      Transfer: A third party to takes on the risk. Cyber insurance is the most common example of this. | low likelihood / high impact

      Terminate: The only way to achieve an acceptable level of risk is to completely stop the activity. | high likelihood / high impact

    15. dominant response in relation to each of the4Ts, according to the position of the risk on a risk matrix

      the "T" that you use is dependent on the location of said risk when graphed on a risk matrix

    16. For hazard risks, the range of responsesavailable is often described as the 4Ts.

      4Ts generally just applies to hazard risks then

    17. significance

      in terms of priority significant risk

    18. In simple terms, a risk management standard is the combination of adescription of the risk management process, together with the recommendedframework

      What is a risk management standard?

    19. four categories

      I think these are the program management outcomes

    20. An event with the ability to impact (inhibit, enhance or cause doubt about) the effectiveness andefficiency of the core processes of an organization

      The book's definition of risk

    Annotators

    1. Finally, extreme risk exceeding the ‘confidence level’ is managed under the approach of ‘self-insurance’

      like how boise state parking will account for x many spots being taken up by trespassers when deciding how many permits to give out

    1. The three disciplines – IT security, risk management and business continuity – are now beginning to converge in the way that they analyze, identify and evaluate threats and risk when it comes to the common goal of continuity and resilience in business operations.

      3 separate things beginning to melt together into the larger cyber security pot

    1. mitigation of risk.

      mitigation actions are traced using the plan of action milestones The controls are then reassessed to determine remediating efficacy. Assessment reports and security and privacy plans are updated accordingly

    2. acceptance of risk

      The authorizing official determines what amount of risk can be accepted based on how well the organization can deal with risk (I think?) Prioritization (I call this triaging) of risk is crucial to this form of risk response. From prioritizing risk, you can then determine an acceptable amount of residual risk

    3. reassess the controls

      basically the monitor and refine phase

    1. risk response strategies

      specific guidelines for responding to risk in the context of the risk type and organizational goals navigating risk response in a ways threat does inadvertently harm the organization

    2. explicit and transparent the risk perceptions that organizations routinely use in makingboth investment and operational decisions

      RM strategies give a guide for how organizations address risk

    1. risk tolerance

      The amount of risk the organization can deal with. This can be expressed with quantitative numbers like money lost.

    2. risk appetite

      The pursuit of risk in terms of the organization's goals and methods of achieving them

    3. Principles and approach

      Key Principles: 1. Risk appetite can be complex so it is best to address said complexity 2. Risk appetite must be measurable in a way that directors and stakeholders can understand. 3. Risk appetite is dynamic, changing in range and breadth based on organizational goals 4. Risk appetite should be developed within the context of the capabilities of the organization. These capabilities are influenced by the culture and resources of the organization. 5. Risk appetite should be addressed throughout every aspect of the organization 6. Risk appetite is influenced by the organization's propensity to take risk and exercise control

    1. If a risk materializes that is closely related to multiple risks, it is likely that a cluster of risks willmaterialize at or near the same time.

      risks that are closely related may snowball into each other priority is then based on the likelihood of said risks actually materializing

    2. total impact to organizations

      takes into account the CIA triad/impact from it's fracture

    3. decide whether a criticalmission/business need today warrants jeopardizing the future capabilities of the organization

      prob needs stakeholder input

    4. risk prioritization that is based on current and future organizational needs

      previous questions define base for risk prioritization weighing current and future impact to the organizations

    5. When too many risks are clustered at or about the samevalue, organizations need a method to refine the presentation of risk assessment results,prioritizing within sets of risks with similar values, to better inform the risk response componentof the risk management process

      A method is needed to take risks and respond to them in a way that can be easily repeated and understood

    6. Prioritization

      Triage of risk because there is a lot of it

    1. RISK RESPONSE

      Respond to findings from the monitor phase in accordance to the organization's risk tolerance. This control stresses the importance of defining appropriate responses to risks before generating a plan of action.

    1. Identify the Potential Impact

      Identify the harm to assets and the potential impact of them being...harmed

    2. Identify the Likelihood Such Attacks Would Succeed

      how likely a threat will attempt to be exploited, how likely the exploitation will succeed, and how likely there will be negative impact from said exploitation

    3. Identify Vulnerabilities and the Conditions Needed to Exploit Them

      define what vulnerabilities you have and how exploitable they are

    4. Identify Threat Events

      come up with every threat you can think of, divided into adversarial and non-adversarial then compile them into criticality

    5. You can’t prepare for threats that you didn’t anticipate

      not completely true hahaha

    6. Identify and Document Threat Sources

      Find adversarial and non-adversarial threats assess them in terms of things that COULD happen

    7. define parameters

      scope and the 3 parts of context

      I assume that the answers to the questions should be ones that non-industry pros could understand

    8. You may want to start with a data audit

      what data you're protecting, how you're protecting it, and how it's being stored

    9. So this cyber risk assessment will serve as a sort of executive summary to help those parties make informed decisions about security

      key is to make it relevant to BoD and Stakeholders who may not be tech-savvy

    10. And you have to be careful when you’re looking for advice on performing a cyber risk analysis, because if you forget the word “cyber” you end up in a land of industrial manufacturing accidents and death & dismemberment clauses.

      Indicates that CRMs are still relatively new and not as high of a concern when compared with traditional ideas of "risk"

    1. Organizations that are faced withalternative objectives seek to understand the shapeand height of a curve for a potential businessobjective

      the level of risk they can tolerate for a given scenario and it's objective

    2. The board of directors is responsible for providing risk oversight of enterprise risk managementculture, capabilities, and practices.

      a team of senior members that oversee all tasks related to risk within their field

      should contain diverse skillsets and backgrounds and have strong leadership skillz

      generally has some lebel of expertise in whatever field they're "directing"

    1. Aligning stakeholders

      Make sure the stakeholders have an understanding of what the IRM program does and how it aligns with thier goals

    2. To cope with an ever-increasing number of regulations, these programs streamline security processes and workflows so that compliance is a byproduct

      being healthy and happy are byproducts of brushing your teeth, working out, and eating good foods

    3. Mapping policies and standards to an industry-recognized comprehensive framework is more important than adopting any particular framework

      every company has different goals so the use of frameworks should be tailored to fit those goals franken-framework???

    4. taxonomies

      An ordered arrangement of groups or categories

    5. IRM programs select roles for targeted efforts based on their level of policy compliance and the amount of harm their behavior can cause

      why the sales rep is a cog in the greater cybersecurity machine

    6. IRM programs also find ways to identify employees who exhibit desired behaviors and reward them with praise or tokens of appreciation

      whoever has the least failed phishing tests gets a gift card

    7. Campaigns based on the psychological drivers of end user behavior are much more likely to result in lasting behavior change.

      Ashley Rose in the first video talks about this Remembering your first college party vs the last test they took

    8. the institution of relatively modest incentives for secure behavior, even limited to praise and token rewards, will have a greater impact on behavior than additional investments in training and communication.

      security-oriented company culture

    9. Still, successful programs use failure modes as a systematic means to identify the relevant risks.

      asset 1 is very important to us, how could it fail?

    10. By analyzing close calls in addition to loss events, high-performing IRM programs dramatically increase their collection of incident data for understanding threat and vulnerability patterns.

      can identify patterns of risky behavior

    11. IRM programs invest in monitoring and analysis to identify emerging risks and mitigate them proactively.

      proactive and preemptive response to risk as opposed to reactive

    12. Innovative tactics work by finding pragmatic substitutes for actuarial data and identifying observable aspects of business operations that can serve as warning signals for likely changes in risk exposure

      find ways to measure risk in a meaningful way, then use that data effectively

    13. mobilizing against challenges just over the horizon.

      resiliency

    1. Retention

      comparison between the amount of risk transferred via insurance vs the amount of risk retained

      risk retention is inversely related to the cost of risk insurance

    2. Theyintroduce a twin‐tier approach with a first tier being the correlation of cyber risks within a firm(e.g., correlated failure of multiple systems on its internal network). The second tier refers tothe correlation at a global level meaning correlation across independent firms in an insurer'sportfolio. Local cyber loss events such as an insider attack (high internal, low global correla-tion) are easier to insure than global loss events because the necessary premium for global lossevents would be extremely high due to the lack of diversification opportunities.

      Internal: stuff that goes wrong within a firm

      External: stuff that goes wrong that effects a firm's clients and third parties (I think??)

    3. actuarial

      statistics, particularly relating to insurance

    4. Transfer

      This part is very heavy on the use of cyber insurance It goes into a lot insurance stuff that kinda just went over my head

    5. Mitigation

      Proactively mitigate risk by analyzing main security concerns and how to satisfy them

      Also goes into detail on how to properly invest in information security by comparing each investment with the value of the risk (I still don't understand how this is done)

    6. four security issues (“access to informationsystems, secure communication, security management, and development of secure informationsystems”) and related techniques (password and biometrical authentication; cryptographictechniques; key management, virtual private networks, and programming language security)

      Technical mitigations defined by established security considerations and their associated techniques

    7. Parkerian hexad

      Like the CIA triad but more detailed, containing 6 pillars as opposed to the original 3

    8. Avoidance

      Avoiding risk wherever possible This treatment is not as relevant today because it isn't resilient-focused (I think)

      They use the example of requiring security policies of IoT devices bc they're usually cheap They also say that this example could be under mitigation

    9. The estimated likelihood and potential impact are used to determine the appropriate treatment,which includes avoidance, mitigation to reduce likelihood and/or potential impact, transfer, andretention.

      The proper treatment for a cyber incident is determined by: the likelihood of the event the potential impact of said event

      The three types of treatments are: Avoidance Mitigation to reduce likelihood/potential impacy Transfer Retention

    10. One way to classify and identify cyberattacks is whether they affect the “con-fidentiality, availability or integrity of information or information systems”

      The CIA triad

    11. This section summarizes, in chronological order, the discussions surrounding cybersecurity issues inthe early days and how cyber risk was eventually identified as one of the major risk categories facingorganizations

      gives historical account of how cyber risks have been identified

    Annotators

  6. Apr 2024
    1. promulgation

      noun

      the act of making a law or decree known, or formally putting it into effect, by public declaration: Upon adoption, signing, and promulgation of these provisions in the established procedure, they acquire the power of law.

      the act of publicly teaching or setting forth an idea, doctrine, etc.: The systematic study of parasites began with the promulgation of the germ theory.

    2. metric descriptor

      Short phrase describing what the metric does and what it measures

    3. Similarly, a few metrics in thecatalog were defined from the cyber resiliency design principles

      ST-#-#

      ST: structural design principle metric first number is number of said design principle

    4. A few metrics in the catalog were defined from cyber resiliency techniques and approaches.These have identifiers of the form TE-AP-#

      TE-AP-#

      TE: technique AP: approach #: number assignment

    5. metric identifier

      generally formatted as: OO-S#-A#-# ex. PA-S1-A2-2

      OO: any one of the cyber resiliency objectives; A for Prevent/Avoid, PR for Prepare, CN for Continue, CS for Constrain, RE for Reconstitute, UN for Understand, TR for Transform, and RA for Re-Architect.

      S# and A# are the sub objective and activity, respectively

      The last space is to assign a number to the objective

    6. catalog entries include information about cyber resilient TTP's and accompanying information about them

    1. Finally,depending on how an organization has defined or articulated its risk management strategy, the selectionand tailoring of cyber resiliency design principles can be driven by that strategy.

      design principles are driven by organization goals and risk management strategy

    2. Representative environmental factors

      determine which design principles are used, how to use them for the target environment, and how to describe said design principles

    3. Re-Architect is supported by most of the strategic design principles, and (inconjunction with the organization’s risk management strategy) drives the selection of structural designprinciples

      re-architect is supported by strategic design principles and drives structural design principles

    4. Prepare involves creating and maintaining aset of realistic courses of action, which are based on the architecture, design, and implementation, ratherthan driving them.

      Prepare comes as a result of arch, des, and impl

    Annotators

    1. Most of these frameworks provide somesubjective guidance from different angels of resilience studyand lack of clear explanation on the quantitative resiliencemetrics formulation

      reason for this paper

    Annotators