null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
45106
Security Mgt U5, risk analysis and mgt (part 1)
Descripción
IYM001 Mapa Mental sobre Security Mgt U5, risk analysis and mgt (part 1), creado por jjanesko el 13/04/2013.
Sin etiquetas
iym001
iym001
Mapa Mental por
jjanesko
, actualizado hace más de 1 año
Más
Menos
Creado por
jjanesko
hace más de 11 años
133
20
0
Resumen del Recurso
Security Mgt U5, risk analysis and mgt (part 1)
risk model
risk
identify, analyze, model
assets
threats
vulnerabilities
management
countermeasures
implementation
audit
definitions
risk
potential for an unwanted event to have a negative impact upon an activity by exploiting an exposure
risk management
reduction of the exposures identified by risk analysis to a level acceptable to the organization
gap analysis
highlights areas where there are significant gaps i the security managemen process or in security measures implemented
business impact analysis
identifies impact for organization if the functions that core information systems are interrupted. quantifies importance for business
assets
physical environment
hardware
data
software/systems
communications network
infrastructure
staff
4 kinds of risk
business
project
operational
financial
related legislation
HIPAA
Gamm Leach Bliley Act
Basel II
Sarbanes Oxley
financial services and markets act
manuallly documented or software-guided?
manual
low cost to entry
simpler but error prone
less efficient
harder to share and repeat
increased cost of expertise maintenance
software guided
consistently implements a specific methodology
guides user
reusable, shareable
dynamic, efficient
software options (image)
Adjunto:
Security Mgt U5, Risk Analysis Methods and Tools (image)
ISMS documentation set
infosec policy
information asset register
risk assessment report
statement of applicability
policies and procedrues
threat motivation
resources
opportunity
capability
publicity
asset attractiveness
qualitative vs. quantitative
qualtitative
capable of handling soft impacts
handles hard & soft impacts consistently
adapts to emerging best practices
accepts that risk mgt is evolving
relies on consensus of "best placed"
dependent on expert opinion
only as good as your best expert opinion
quantitative
every loss is capable of beig expressed in financial terms
requires careful records
formula for financial impact (image)
Adjunto:
Security Mgt U5, quantitative risk assessment forumula (image)
expected frequency of attacks is known (statistics bank)
has problems with new risks
has problems with less concrete risk
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
Security Mgt, ISO 27001, PDCA
jjanesko
Exemplary Assignment Answers
jjanesko
Security Mgt, Flashcards for ISO 27000 series
jjanesko
Security Mgt U3, BS7799 (Part 1)
jjanesko
Security Mgt U3, BS7799 (Part 2)
jjanesko
Security Mgt U5, Risk Analysis Methods and Tools (image)
jjanesko
Security Mgt U5, quantitative risk assessment forumula (image)
jjanesko
Security Mgt U5, risk analysis & mgt (part 2)
jjanesko
Security Mgt U8, Information Assurance
jjanesko
Security Mgt U8, Incident Recovery Image
jjanesko
Security Mgt U10, world class security infrastructure
jjanesko
Explorar la Librería