Preview

Chpt 4 Shrinking The Info Security Gap

Satisfactory Essays
Open Document
Open Document
396 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chpt 4 Shrinking The Info Security Gap
Security gaps occur whenever there are lapses in the secure application or implementation of a company’s policies, protocols, procedures, and practices. Risk management helps shrink the security gap by identifying, assessing, prioritizing, and addressing various forms of risk. The difference between established security controls and controls needed to address all vulnerabilities is called the security gap.

There are several reasons for security gaps including the following:
Unintentional lack of security policy or procedure for a certain vulnerability
Intentional and willful neglect of security policy or procedure
Unintended consequence of recent IT infrastructure change
Result of changes to external requirements, such as laws, regulations, and practices

The two primary goals of risk management include:
Minimize the effects of negative risks that occur.
Maximize the effects of positive risks that occur.

Risk equals the number of threats against an organization’s resources multiplied by the number of vulnerabilities. Threat is the likelihood that a bad event will occur, vulnerability is the potential weak point, and risk is the result of threat and vulnerability combined.

Risk mitigation is the process of investing secure measures for reducing risk over time. Problem severity refers to how badly and broadly a problem can affect critical resources and the nature of the problem. A system intrusion may have greater severity if it involves disclosure of confidential information and less severity if the intruder gained no special privileges and modified no important data.

Risk management is the process of identifying, analyzing, planning, and responding to risks. Threats and vulnerabilities are permanent fixtures of any IT organization and must be monitored and managed over time. As a result, risk management is a recurring process that seeks to constantly re-evaluate the security stance, particularly with regard to emerging threats and attack trends.

Companies

You May Also Find These Documents Helpful

  • Powerful Essays

    BSBRSK501B Manage Risk

    • 4582 Words
    • 17 Pages

    Risk management utilizes the right tools, methods and processes to manage risk. Risk is defined as the probability of an unforeseen incident and its penalty. For a business, exposure to risk could lead to disaster.…

    • 4582 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    The focus of the risk management plan is to provide an ongoing, comprehensive, and systematic approach to reducing risk exposures. Risk management activities include identifying, investigating, analyzing, and evaluating risks, followed by selecting and implementing the most appropriate methods for correcting, reducing, managing, transferring and/or eliminating them.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Fin 370

    • 461 Words
    • 3 Pages

    Risk is the potential that a chosen action or activity (including the choice of inaction) will lead to a loss (an undesirable outcome).…

    • 461 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unit 6 Assignment 2

    • 878 Words
    • 4 Pages

    1996] define risk management as a systematic process of identification, analysis and response to the project risks, process comprising the risk identification, risk quantification, risk response plan, risk response control sub processes.…

    • 878 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Human resource management should be in compliance with the law of safety and health standards.…

    • 739 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Common security countermeasures typically found in an IT infrastructure  Risk assessment approach to securing an IT infrastructure  Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Apes Ch 8 Notes

    • 3860 Words
    • 16 Pages

    3. Risk management involves deciding whether or how to reduce a particular risk to a certain level and at what cost.…

    • 3860 Words
    • 16 Pages
    Better Essays
  • Better Essays

    Risk is the chance or probability that a person will be harmed or experience an adverse health effect if exposed to a hazard.…

    • 2324 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    A Risk Assessment is periodic assessment of the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the organization. A risk assessment should include a consideration of the major factors in risk management: the value of the system or application, threats, vulnerabilities, and the effectiveness of current or proposed safeguards.…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A risk is a situation involving exposure to danger and the potential to lose or gain…

    • 771 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Risk is the potential that a chosen action or activity (including the choice of inaction) will lead to a loss (an undesirable outcome). The notion implies that a choice having an influence on the outcome exists (or existed). Potential losses themselves may also be called "risks". Almost any human endeavor carries some risk, but some are much more risky than others.…

    • 1077 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    What is the relationship between risks, threats, and vulnerabilities as it pertains to information systems security throughout the seven domains of a typical IT There are seven domains of an infrastructure, user, workstation, LAN, LAN to WAN, components, remote access, and system/application. We all know that the user is the weakest link in security which are vulnerable to threats and may cause risk in the future. When thinking Risk we assume that something could happen now or down the line. When we think about Threat we assume the action that could damage an asset, and make our system vulnerability, which is the weakness that allows a threat to be realized. Risk mitigation must include finding and eliminating vulnerabilities and exploits infrastructure.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Pipkin (2000) says that risk management is the prioritization, assessment and identification of threats followed up…

    • 1049 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Aviation Saftey

    • 463 Words
    • 2 Pages

    The risk management component consists of a set of procedures to identify, analyze and evaluate risks and to develop controls that can prevent them. The system analyzes the interaction among different components of an organization of people, facilities, technology and the environment.…

    • 463 Words
    • 2 Pages
    Satisfactory Essays

Related Topics