IT Security management and risk assessment

MoHE um CAS
14. Sep 2017
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
IT Security management and risk assessment
1 von 22

Más contenido relacionado

Was ist angesagt?

Risk AssessmentsRisk Assessments
Risk AssessmentsJoAnna Cheshire
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
Information securityInformation security
Information securityavinashbalakrishnan2
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
8. operations security8. operations security
8. operations security7wounders

Similar a IT Security management and risk assessment

Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016EnterpriseGRC Solutions, Inc.
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanTripwire
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
Threat Modelling and managed risks for medical devicesThreat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devicesFrédéric Sagez
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...CompTIA
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)ishan parikh production

Similar a IT Security management and risk assessment(20)

Más de CAS

CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCAS
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4CAS
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3CAS
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2CAS
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1CAS

Último

Safe Community Call #12.pdfSafe Community Call #12.pdf
Safe Community Call #12.pdfLornyPfeifer
sap.pptxsap.pptx
sap.pptxSAP
Framing Few Shot Knowledge Graph Completion with Large Language ModelsFraming Few Shot Knowledge Graph Completion with Large Language Models
Framing Few Shot Knowledge Graph Completion with Large Language ModelsMODUL Technology GmbH
Product Research Presentation-Maidy Veloso.pptxProduct Research Presentation-Maidy Veloso.pptx
Product Research Presentation-Maidy Veloso.pptxMaidyVeloso
Mule Meetup Calgary- API Governance & Conformance.pdfMule Meetup Calgary- API Governance & Conformance.pdf
Mule Meetup Calgary- API Governance & Conformance.pdfNithaJoseph4
info_session_gdsc_tmsl .pptxinfo_session_gdsc_tmsl .pptx
info_session_gdsc_tmsl .pptxNikitaSingh741518

IT Security management and risk assessment

Hinweis der Redaktion

  1. The results of the risk analysis process should be documented in a risk register. This should include a summary table such that shown in Table 16.5 from the text. The risks are usually sorted in decreasing order of level. This would be supported by details of how the various items were determined, including the rationale, justification, and supporting evidence used. The aim of this documentation is to provide senior management with the information they need to make appropriate decisions as how to best manage the identified risks. It also provides evidence that a formal risk assessment process has been followed if needed, and a record of decisions taken with their reasons. Once the details of potentially significant risks are determined, management needs to decide whether it needs to take action in response. This would take into account the risk profile of the organization, and its willingness to accept a certain level of risk, as determined in the initial “Establishing the Context” phase of this process. Those items with risk levels below the acceptable level would usually be accepted with no further action required. Those items with risks above this will need to be considered for treatment. Typically the risks with the higher ratings are those that need most urgently action. However, it is likely that some risks will be easier, faster, and cheaper to action than others. In the example shown, both risks were rated High. Further investigation reveals that a relatively simple and cheap treatment exists for the first risk, by tightening the router configuration to further restrict possible accesses. Treating the second risk requires the development of a full disaster recovery plan, a much slower and more costly process. Hence management would take the simple action first, to improve the organization’s overall risk profile as quickly as possible.