Security Mgt U5, risk analysis & mgt (part 2)

Beschreibung

IYM001 Mindmap am Security Mgt U5, risk analysis & mgt (part 2), erstellt von jjanesko am 13/04/2013.
jjanesko
Mindmap von jjanesko, aktualisiert more than 1 year ago
jjanesko
Erstellt von jjanesko vor mehr als 11 Jahre
104
20

Zusammenfassung der Ressource

Security Mgt U5, risk analysis & mgt (part 2)
  1. stages of the risk analysis and management process
    1. stage 1
      1. What is the value of the information being processed?
        1. costs of assets
          1. replacement costs
            1. for software: only valued insofar as it provides competitive advantage
            2. what devalues assets?
              1. modification
                1. unavailability
                  1. disclosure
                    1. destruction
                      1. communication interference
                    2. What parts of the system support which business processes?
                      1. identify assets
                      2. stage 2
                        1. identify threats, vulnerabilities and risk
                          1. What threats affect the system?
                            1. How vulnerable are our systems?
                              1. What conclusions can be reached about the risks to our security?
                                1. assessing a new system for risk
                                  1. I do have a similar system.
                                    1. use stats from this system
                                    2. I don't have a similar system.
                                      1. seek industry stats or best guess
                                    3. types of threats
                                      1. logical
                                        1. communications
                                          1. technical failures
                                            1. human errors
                                              1. physical
                                              2. types of vulnerabilities
                                                1. facilities and functionalities
                                                  1. system dependence
                                                    1. design
                                                2. stage 3
                                                  1. How can the identified risks be met?
                                                    1. countermeasures
                                                      1. kinds
                                                        1. 1. avoid
                                                          1. 2. transfer
                                                            1. 3. reduce threat
                                                              1. 4. reduce vulnerability
                                                                1. 5. reduce impact
                                                                  1. 6. detect
                                                                    1. 7. recover
                                                                    2. review and mark countermeasrues
                                                                      1. installed
                                                                        1. not applicable
                                                                          1. under consideration
                                                                            1. requires management consultation to determine whether or not this countermeasure is applicable or not
                                                                          2. prioritization
                                                                            1. already in place
                                                                              1. covers many threats
                                                                                1. required
                                                                                  1. low cost high effectiveness
                                                                              2. What improvements can be made to existing security?
                                                                                1. gap analysis
                                                                                  1. highlights countermeasures that are not in place
                                                                            Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                                            ähnlicher Inhalt

                                                                            Security Mgt, ISO 27001, PDCA
                                                                            jjanesko
                                                                            Exemplary Assignment Answers
                                                                            jjanesko
                                                                            Security Mgt, Flashcards for ISO 27000 series
                                                                            jjanesko
                                                                            Security Mgt U5, risk analysis and mgt (part 1)
                                                                            jjanesko
                                                                            Security Mgt U8, Information Assurance
                                                                            jjanesko
                                                                            Security Mgt U5, quantitative risk assessment forumula (image)
                                                                            jjanesko
                                                                            Security Mgt U8, Incident Recovery Image
                                                                            jjanesko
                                                                            Security Mgt U3, BS7799 (Part 2)
                                                                            jjanesko
                                                                            Security Mgt U3, BS7799 (Part 1)
                                                                            jjanesko
                                                                            Security Mgt U5, Risk Analysis Methods and Tools (image)
                                                                            jjanesko
                                                                            Security Mgt U10, Scope of Incident Response (chart)
                                                                            jjanesko