null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
34781666
Assets and Risk Managment
Descripción
It's important to identify the asset to protect and Risk Management identifies the risks and make comprehensive solutions
Sin etiquetas
cisco
cyberessentials
mindmap
1
Mapa Mental por
Hisham Haneefa
, actualizado hace más de 1 año
Más
Menos
Creado por
Hisham Haneefa
hace más de 2 años
4
0
0
Resumen del Recurso
Assets and Risk Managment
Asset Managment
Assets Identification
Inventory of
Hardawares
Softwares
Network Devices
Firmware
Runtime environments , libraries
Assets Classifications
1.category Identifications
Information asset
Software asset
Physical Asset
Services
2.Identifying the owner
Owner for all information assets
Owner for the all software app..
3.Crederia for identification
Confidentiality
value
Time
Access Right
Destruction
4.Implement Schema
Assets Lifecycle
Procurement
Deployment
Utilizations
Maintenance
Disposal
Risk Managment
Risks Types
High Risk
Lower Risks
Acceptable Risks
Risk Managment Process
Frame the risk
Access the Risks
Respond to Risks
Monitor the RIsks
Risk Assessment
Thread Source Type
Adversarial
Nota:
threads from individuals , groups, organizations, nations
Accidental
Nota:
actions with out malicious intend
Environmental
Nota:
natural disaster, human - aided
Structural
Nota:
software hardware failures
Risk Analysis
Nota:
Examine the dangers poses by the disasters or human involved actions
Quantitative Risk Analysis
Qualitative Risk Analysis
Mitigations
Accept the risk and periodically reassess
Reduce the risk by implementing controls
Nota:
by providing updates and patches
Avoid risk by changing approach totally
Transfer the risk to 3rd party
Nota:
hire specialist
Security Controls
Control types
Administrative Control
Nota:
determine how people acts consists with policies and procedures
Technical Control
Nota:
-involved software and hardware - manage risks and provide protections
Physical Control
Nota:
separate people or other threats from system
Functional security Controls
Preventive Control
Nota:
prevent unauthorized and unwanted activities happen
Deterrent Control
Nota:
discourage before something happens
Detective Control
Nota:
identifies the different type of unauthorized activities
Corrective Control
Recovery Control
Compensative control
Nota:
alternative solutions
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
CCNA Security 210-260 IINS - Exam 1
Mike M
CCNA Security 210-260 IINS - Exam 3
Mike M
CCNA Security 210-260 IINS - Exam 2
Mike M
Life in Germany
Ben C
Treaty of Versailles (1919)
Inez Simpson
George- Of mice and men
Elinor Jones
“The knower’s perspective is essential in the pursuit of knowledge.” To what extent do you agree with this statement?
Lucia Rocha Mejia
Project Scope Management Process
neeshar
Physics - Electricity
dana-howbridge
AQA AS Biology - Pathogens and Disease
dillyrules
unit 1 f321 chemistry ocr
methmip
Explorar la Librería