Preview

Chapter 4 Risk Management

Powerful Essays
Open Document
Open Document
1318 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chapter 4 Risk Management
Chapter 4 - Risk Management

1. What is risk management? Why is identification of risks, by listing assets and their vulnerabilities, so important to the risk management process? Risk management is the process of identifying risk, as represented by vulnerabilities, to an organization’s information assets and infrastructure, and taking steps to reduce this risk to an acceptable level. Each of the three elements in the C.I.A. triangle, introduced in Chapter 1, is an essential part of every IT organization’s ability to sustain long-term competitiveness. When an organization depends on IT-based systems to remain viable, information security and the discipline of risk management must become an integral part of the economic basis for making business decisions. These decisions are based on trade-offs between the costs of applying information systems controls and the benefits realized from the operation of secured, available systems.
2. According to Sun Tzu, what two key understandings must you achieve to be successful? Know Yourself and Know the Enemy
3. Who is responsible for risk management in an organization? Which community of interest usually takes the lead in information security risk management? The resources used when undertaking information asset risk management is usually provided by all three communities: Information Security, Information Technology and General Management.
4. In risk management strategies, why must periodic review be a part of the process? Periodic reviews must be a part of the risk management strategies because threats are constantly changing for a company. Also once any specific vulnerability is completely managed by an existing control it no longer needs to be considered for additional controls.
5. Why do networking components need more examination from an information security perspective than from a systems development perspective? Networking components need more examination from an information security perspective than from a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    iii.Install water saving devices such as native plants, tank, dual flush toilet systems, 5-6 star (WELS) dishwasher.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The step, that I believe is the most important in the risk management process, is vulnerability identification. A vulnerability is a weakness in the infrastructure or environment of the network. Any weakness can be exposed (exploited) and threatened. If vulnerabilities are not identified, then how can the Security Administrator properly set security policies and guidelines in place to protect the network? If he/she doesn’t know of the vulnerabilities, then they will never put things in place until some threat occurs to the network. Network vulnerabilities come in many forms and fashions, and must be identified to be properly mitigated.…

    • 167 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Bsbpmg510A Kbq

    • 635 Words
    • 3 Pages

    Risk Management: While a new process or equipment may seem desirable this is not always the case due to the risks involved whether it be financial or otherwise. All these risks must be kept to a minimum through risk analysis in the planning and brainstorming phases or the new project could have a detrimental effect on the business or individuals.…

    • 635 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Each of these risk mitigation options requires development of an action plan that is implemented and monitored for effectiveness. The three I would focus on are, Watch/Monitor, Assume/Accept, and Transfer. The reason is that you must first monitor to identify the risk then you must accept the risk is valid and if you cannot manage the risk in your area you then transfer the risk to the functional area that can best mitigate or eliminate the risk. The best way is to chart the risks in a diagram as shown below.…

    • 2075 Words
    • 9 Pages
    Better Essays
  • Good Essays

    The focus of the risk management plan is to provide an ongoing, comprehensive, and systematic approach to reducing risk exposures. Risk management activities include identifying, investigating, analyzing, and evaluating risks, followed by selecting and implementing the most appropriate methods for correcting, reducing, managing, transferring and/or eliminating them.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 6 Assignment 2

    • 878 Words
    • 4 Pages

    All the elements of the risk management cycle are important but risk assessment is the headstone for all the other elements.…

    • 878 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    ISSC363 Assignment 3

    • 586 Words
    • 2 Pages

    Conducting a thorough risk assessment is certainly one of the top priorities in the overall risk management program. It is a process of identifying and evaluating the risks that can have a negative impact on an organization. Once the risks have been successfully captured, they can be assessed and prioritized according to the severity of their potential impact. While every organization should have a continuous risk management program, a risk assessment is conducted at a given moment in time, and as such should be repeated on some predetermined schedule to reevaluate the risks and adjust as appropriate. To conduct an effective risk assessment, it’s important to be able to fundamentally describe of the purpose of a risk assessment, risk scope and identify critical areas for an assessment. Additionally, a methodology that is appropriate for the risk assessment should be selected.…

    • 586 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Apes Ch 8 Notes

    • 3860 Words
    • 16 Pages

    3. Risk management involves deciding whether or how to reduce a particular risk to a certain level and at what cost.…

    • 3860 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    Every organization is faced with some risk or potential threat that could cause an interruption to the organization’s operations. These risks and threats can come from within or outside of the organization. To prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risks to protect the organization from the possible negative effects to the daily operations. Performing a risk assessment is one of the most important steps in the risk management process (eHow, 2011).…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Risks are a part of everyday living and each and every job no matter how big or small the organization or company. As petty as it sounds, when waking up in the morning there is a risk of tripping on a shoe or a pair of pants that were taken off the night before. When cooking breakfast there is a risk of burning the bacon, or forgetting to set the alarm before exiting the house. While at work there is a risk of saying something funny but may be deemed inappropriate to a co-worker. Every day individuals come in contact with minor situations that are often over looked until the…

    • 1570 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Unit 4 Assignment 4

    • 340 Words
    • 2 Pages

    One the first steps in implementing an effective security plan is to periodically assess Organizational risks. Identifying and mitigating risk will help in establishing a security management structure and assigning security responsibilities. Without having an understanding of your risk you are unable to determine the proper security policies, procedures, guidelines, and standards to put in place to ensure adequate security controls are implemented. The risk assessment provides a baseline for implementing security plans to protect assets against threats. Within the risk assessment some basic questions must be answered, What assets within the organization need protection, What are the risks to each of these assets, How much time, effort, and money is the organization willing to spend to upgrade or obtain new adequate protection against these threats?…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Risk assessment and risk management are regarded as key activities during preparation, critical reviews and implementation of a major application system like a VAT system. The risks that may impede the implementation covers a much broader spectrum than that of the information system itself as depicted below.…

    • 740 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Question 3. What approach to risk management will identify threats, vulnerabilities, and the critical assets that we must protect?…

    • 734 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Risk Management

    • 607 Words
    • 3 Pages

    The candidate does not develop a social responsibility strategy for the chosen client that includes an environmental considerations and recommendations component.…

    • 607 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Childcare

    • 484 Words
    • 2 Pages

    6. Monitor the risk assessment and review at a later day – Monitoring the risk assessment means paying attention to how effective your measures are in practice.…

    • 484 Words
    • 2 Pages
    Satisfactory Essays

Related Topics