Preview

Risk management - security

Good Essays
Open Document
Open Document
818 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk management - security
Tutorial and Lab 4 – SD3043
Risk management - security

1. What is risk management?
Answer: Risk management is the process of discovering and assessing the risks to an organization's operations and determining how those risks can be controlled or mitigated.

2. List and describe the key areas of concern for risk management.
Answer: Risk identification, risk assessment, and risk control.

3. Which community of interest usually provides the resources used when undertaking information asset risk management?
Answer: The resources used when undertaking information asset risk management is usually provided by all three communities: Information Security, Information Technology and General Management.

4. In risk management strategies, why must periodic review be a part of the process?
Answer: Periodic reviews must be a part of the risk management strategies because threats are constantly changing for a company. Also once any specific vulnerability is completely managed by an existing control it no longer needs to be considered for additional controls.

5. Why do networking components need more examination from an information security perspective than from a systems development perspective?
Answer: Networking components need more examination from an information security perspective than from a systems development perspective because networking subsystems are often the focal point of attacks against the system.

6. What value would an automated asset inventory system have for the risk identification process?
Answer: An automated asset inventory system would be valuable to the risk identification process because all hardware components are already identified – models, make and locations – thus management can review for the most critical items and assess the values.

7. How many categories should a data classification scheme include? Why?
Answer: An organization would need as many categories as necessary to include all of it’s need to treat different groupings with the

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Cis 850 Study Guid

    • 499 Words
    • 2 Pages

    * Describe the three types of IT assets that must be well managed in today's digital age.…

    • 499 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Common security countermeasures typically found in an IT infrastructure  Risk assessment approach to securing an IT infrastructure  Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Health and Saftey

    • 2038 Words
    • 9 Pages

    |and reviewed- Risk assessments are made continuously throughout | | | | | | | | | | |…

    • 2038 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    Unit 101

    • 968 Words
    • 3 Pages

    audits of how effective management structures and risk controls for health and safety should be carried out as often as necessary…

    • 968 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Question 3. What approach to risk management will identify threats, vulnerabilities, and the critical assets that we must protect?…

    • 734 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    This report adheres to the Academic Honesty Statement the professor has on file for all group members.…

    • 2053 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Childcare

    • 484 Words
    • 2 Pages

    6. Monitor the risk assessment and review at a later day – Monitoring the risk assessment means paying attention to how effective your measures are in practice.…

    • 484 Words
    • 2 Pages
    Satisfactory Essays

Related Topics