Preview

Chapter 4 Risk Management

Powerful Essays
Open Document
Open Document
1318 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chapter 4 Risk Management
Chapter 4 - Risk Management

1. What is risk management? Why is identification of risks, by listing assets and their vulnerabilities, so important to the risk management process? Risk management is the process of identifying risk, as represented by vulnerabilities, to an organization’s information assets and infrastructure, and taking steps to reduce this risk to an acceptable level. Each of the three elements in the C.I.A. triangle, introduced in Chapter 1, is an essential part of every IT organization’s ability to sustain long-term competitiveness. When an organization depends on IT-based systems to remain viable, information security and the discipline of risk management must become an integral part of the economic basis for making business decisions. These decisions are based on trade-offs between the costs of applying information systems controls and the benefits realized from the operation of secured, available systems.
2. According to Sun Tzu, what two key understandings must you achieve to be successful? Know Yourself and Know the Enemy
3. Who is responsible for risk management in an organization? Which community of interest usually takes the lead in information security risk management? The resources used when undertaking information asset risk management is usually provided by all three communities: Information Security, Information Technology and General Management.
4. In risk management strategies, why must periodic review be a part of the process? Periodic reviews must be a part of the risk management strategies because threats are constantly changing for a company. Also once any specific vulnerability is completely managed by an existing control it no longer needs to be considered for additional controls.
5. Why do networking components need more examination from an information security perspective than from a systems development perspective? Networking components need more examination from an information security perspective than from a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    iii.Install water saving devices such as native plants, tank, dual flush toilet systems, 5-6 star (WELS) dishwasher.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The step, that I believe is the most important in the risk management process, is vulnerability identification. A vulnerability is a weakness in the infrastructure or environment of the network. Any weakness can be exposed (exploited) and threatened. If vulnerabilities are not identified, then how can the Security Administrator properly set security policies and guidelines in place to protect the network? If he/she doesn’t know of the vulnerabilities, then they will never put things in place until some threat occurs to the network. Network vulnerabilities come in many forms and fashions, and must be identified to be properly mitigated.…

    • 167 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Bsbpmg510A Kbq

    • 635 Words
    • 3 Pages

    Risk Management: While a new process or equipment may seem desirable this is not always the case due to the risks involved whether it be financial or otherwise. All these risks must be kept to a minimum through risk analysis in the planning and brainstorming phases or the new project could have a detrimental effect on the business or individuals.…

    • 635 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Risk Management is the responsibility of every employee at the facility. Due to the size and complexity of the facility and its programs, participation for all the staff is necessary for effective management of risk.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 6 Assignment 2

    • 878 Words
    • 4 Pages

    1996] define risk management as a systematic process of identification, analysis and response to the project risks, process comprising the risk identification, risk quantification, risk response plan, risk response control sub processes.…

    • 878 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Each of these risk mitigation options requires development of an action plan that is implemented and monitored for effectiveness. The three I would focus on are, Watch/Monitor, Assume/Accept, and Transfer. The reason is that you must first monitor to identify the risk then you must accept the risk is valid and if you cannot manage the risk in your area you then transfer the risk to the functional area that can best mitigate or eliminate the risk. The best way is to chart the risks in a diagram as shown below.…

    • 2075 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    ISSC363 Assignment 3

    • 586 Words
    • 2 Pages

    At its core, the purpose of a risk assessment is identifying and evaluating risks that may potentially have a negative impact on an organization. It can help management understand the impact in terms of costs to the organization or the severity of a loss depending on the methodology used to conduct the risk assessment. The goal is to provide sound recommendations based on the risk assessment to help maintain data confidentiality, integrity and vulnerability while ensuring functionality and usability. Based on the results, management can make more informed decisions about what resources to protect, how to protect them and understand the potential costs and impact. Once the purpose of the risk assessment is understood, defining the scope is next.…

    • 586 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Apes Ch 8 Notes

    • 3860 Words
    • 16 Pages

    3. Risk management involves deciding whether or how to reduce a particular risk to a certain level and at what cost.…

    • 3860 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    A Risk Assessment is periodic assessment of the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the organization. A risk assessment should include a consideration of the major factors in risk management: the value of the system or application, threats, vulnerabilities, and the effectiveness of current or proposed safeguards.…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Risks are a part of everyday living and each and every job no matter how big or small the organization or company. As petty as it sounds, when waking up in the morning there is a risk of tripping on a shoe or a pair of pants that were taken off the night before. When cooking breakfast there is a risk of burning the bacon, or forgetting to set the alarm before exiting the house. While at work there is a risk of saying something funny but may be deemed inappropriate to a co-worker. Every day individuals come in contact with minor situations that are often over looked until the…

    • 1570 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Unit 4 Assignment 4

    • 340 Words
    • 2 Pages

    One the first steps in implementing an effective security plan is to periodically assess Organizational risks. Identifying and mitigating risk will help in establishing a security management structure and assigning security responsibilities. Without having an understanding of your risk you are unable to determine the proper security policies, procedures, guidelines, and standards to put in place to ensure adequate security controls are implemented. The risk assessment provides a baseline for implementing security plans to protect assets against threats. Within the risk assessment some basic questions must be answered, What assets within the organization need protection, What are the risks to each of these assets, How much time, effort, and money is the organization willing to spend to upgrade or obtain new adequate protection against these threats?…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Risk assessment and risk management are regarded as key activities during preparation, critical reviews and implementation of a major application system like a VAT system. The risks that may impede the implementation covers a much broader spectrum than that of the information system itself as depicted below.…

    • 740 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Question 3. What approach to risk management will identify threats, vulnerabilities, and the critical assets that we must protect?…

    • 734 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Risk Management

    • 607 Words
    • 3 Pages

    The candidate does not develop a social responsibility strategy for the chosen client that includes an environmental considerations and recommendations component.…

    • 607 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Childcare

    • 484 Words
    • 2 Pages

    The responsibility to undertake a risk assessment mostly lies with management of the setting, but the most effective method will include all members of staff…

    • 484 Words
    • 2 Pages
    Satisfactory Essays

Related Topics