Security Mgt U5, risk analysis & mgt (part 2)

Descrição

IYM001 Mapa Mental sobre Security Mgt U5, risk analysis & mgt (part 2), criado por jjanesko em 13-04-2013.
jjanesko
Mapa Mental por jjanesko, atualizado more than 1 year ago
jjanesko
Criado por jjanesko mais de 11 anos atrás
104
20

Resumo de Recurso

Security Mgt U5, risk analysis & mgt (part 2)
  1. stages of the risk analysis and management process
    1. stage 1
      1. What is the value of the information being processed?
        1. costs of assets
          1. replacement costs
            1. for software: only valued insofar as it provides competitive advantage
            2. what devalues assets?
              1. modification
                1. unavailability
                  1. disclosure
                    1. destruction
                      1. communication interference
                    2. What parts of the system support which business processes?
                      1. identify assets
                      2. stage 2
                        1. identify threats, vulnerabilities and risk
                          1. What threats affect the system?
                            1. How vulnerable are our systems?
                              1. What conclusions can be reached about the risks to our security?
                                1. assessing a new system for risk
                                  1. I do have a similar system.
                                    1. use stats from this system
                                    2. I don't have a similar system.
                                      1. seek industry stats or best guess
                                    3. types of threats
                                      1. logical
                                        1. communications
                                          1. technical failures
                                            1. human errors
                                              1. physical
                                              2. types of vulnerabilities
                                                1. facilities and functionalities
                                                  1. system dependence
                                                    1. design
                                                2. stage 3
                                                  1. How can the identified risks be met?
                                                    1. countermeasures
                                                      1. kinds
                                                        1. 1. avoid
                                                          1. 2. transfer
                                                            1. 3. reduce threat
                                                              1. 4. reduce vulnerability
                                                                1. 5. reduce impact
                                                                  1. 6. detect
                                                                    1. 7. recover
                                                                    2. review and mark countermeasrues
                                                                      1. installed
                                                                        1. not applicable
                                                                          1. under consideration
                                                                            1. requires management consultation to determine whether or not this countermeasure is applicable or not
                                                                          2. prioritization
                                                                            1. already in place
                                                                              1. covers many threats
                                                                                1. required
                                                                                  1. low cost high effectiveness
                                                                              2. What improvements can be made to existing security?
                                                                                1. gap analysis
                                                                                  1. highlights countermeasures that are not in place

                                                                            Semelhante

                                                                            Security Mgt, ISO 27001, PDCA
                                                                            jjanesko
                                                                            Exemplary Assignment Answers
                                                                            jjanesko
                                                                            Security Mgt, Flashcards for ISO 27000 series
                                                                            jjanesko
                                                                            Security Mgt U5, risk analysis and mgt (part 1)
                                                                            jjanesko
                                                                            Security Mgt U8, Information Assurance
                                                                            jjanesko
                                                                            Security Mgt U5, quantitative risk assessment forumula (image)
                                                                            jjanesko
                                                                            Security Mgt U8, Incident Recovery Image
                                                                            jjanesko
                                                                            Security Mgt U3, BS7799 (Part 2)
                                                                            jjanesko
                                                                            Security Mgt U3, BS7799 (Part 1)
                                                                            jjanesko
                                                                            Security Mgt U5, Risk Analysis Methods and Tools (image)
                                                                            jjanesko
                                                                            Security Mgt U10, Scope of Incident Response (chart)
                                                                            jjanesko