Security Mgt U5, risk analysis & mgt (part 2)

Descripción

IYM001 Mapa Mental sobre Security Mgt U5, risk analysis & mgt (part 2), creado por jjanesko el 13/04/2013.
jjanesko
Mapa Mental por jjanesko, actualizado hace más de 1 año
jjanesko
Creado por jjanesko hace más de 11 años
104
20

Resumen del Recurso

Security Mgt U5, risk analysis & mgt (part 2)
  1. stages of the risk analysis and management process
    1. stage 1
      1. What is the value of the information being processed?
        1. costs of assets
          1. replacement costs
            1. for software: only valued insofar as it provides competitive advantage
            2. what devalues assets?
              1. modification
                1. unavailability
                  1. disclosure
                    1. destruction
                      1. communication interference
                    2. What parts of the system support which business processes?
                      1. identify assets
                      2. stage 2
                        1. identify threats, vulnerabilities and risk
                          1. What threats affect the system?
                            1. How vulnerable are our systems?
                              1. What conclusions can be reached about the risks to our security?
                                1. assessing a new system for risk
                                  1. I do have a similar system.
                                    1. use stats from this system
                                    2. I don't have a similar system.
                                      1. seek industry stats or best guess
                                    3. types of threats
                                      1. logical
                                        1. communications
                                          1. technical failures
                                            1. human errors
                                              1. physical
                                              2. types of vulnerabilities
                                                1. facilities and functionalities
                                                  1. system dependence
                                                    1. design
                                                2. stage 3
                                                  1. How can the identified risks be met?
                                                    1. countermeasures
                                                      1. kinds
                                                        1. 1. avoid
                                                          1. 2. transfer
                                                            1. 3. reduce threat
                                                              1. 4. reduce vulnerability
                                                                1. 5. reduce impact
                                                                  1. 6. detect
                                                                    1. 7. recover
                                                                    2. review and mark countermeasrues
                                                                      1. installed
                                                                        1. not applicable
                                                                          1. under consideration
                                                                            1. requires management consultation to determine whether or not this countermeasure is applicable or not
                                                                          2. prioritization
                                                                            1. already in place
                                                                              1. covers many threats
                                                                                1. required
                                                                                  1. low cost high effectiveness
                                                                              2. What improvements can be made to existing security?
                                                                                1. gap analysis
                                                                                  1. highlights countermeasures that are not in place
                                                                            Mostrar resumen completo Ocultar resumen completo

                                                                            Similar

                                                                            Security Mgt, ISO 27001, PDCA
                                                                            jjanesko
                                                                            Exemplary Assignment Answers
                                                                            jjanesko
                                                                            Security Mgt, Flashcards for ISO 27000 series
                                                                            jjanesko
                                                                            Security Mgt U5, risk analysis and mgt (part 1)
                                                                            jjanesko
                                                                            Security Mgt U8, Information Assurance
                                                                            jjanesko
                                                                            Security Mgt U5, quantitative risk assessment forumula (image)
                                                                            jjanesko
                                                                            Security Mgt U8, Incident Recovery Image
                                                                            jjanesko
                                                                            Security Mgt U3, BS7799 (Part 2)
                                                                            jjanesko
                                                                            Security Mgt U3, BS7799 (Part 1)
                                                                            jjanesko
                                                                            Security Mgt U5, Risk Analysis Methods and Tools (image)
                                                                            jjanesko
                                                                            Security Mgt U10, Scope of Incident Response (chart)
                                                                            jjanesko