Assets and Risk Managment

Description

It's important to identify the asset to protect and Risk Management identifies the risks and make comprehensive solutions
Hisham Haneefa
Mind Map by Hisham Haneefa, updated more than 1 year ago
Hisham Haneefa
Created by Hisham Haneefa over 2 years ago
4
0

Resource summary

Assets and Risk Managment
  1. Asset Managment
    1. Assets Identification
      1. Inventory of
        1. Hardawares
          1. Softwares
            1. Network Devices
            2. Firmware
              1. Runtime environments , libraries
              2. Assets Classifications
                1. 1.category Identifications
                  1. Information asset
                    1. Software asset
                      1. Physical Asset
                        1. Services
                          1. 2.Identifying the owner
                            1. Owner for all information assets
                              1. Owner for the all software app..
                                1. 3.Crederia for identification
                                  1. Confidentiality
                                    1. value
                                      1. Time
                                        1. Access Right
                                          1. Destruction
                                            1. 4.Implement Schema
                                      2. Assets Lifecycle
                                        1. Procurement
                                          1. Deployment
                                            1. Utilizations
                                              1. Maintenance
                                                1. Disposal
                                              2. Risk Managment
                                                1. Risks Types
                                                  1. High Risk
                                                    1. Lower Risks
                                                      1. Acceptable Risks
                                                      2. Risk Managment Process
                                                        1. Frame the risk
                                                          1. Access the Risks
                                                            1. Respond to Risks
                                                              1. Monitor the RIsks
                                                            2. Risk Assessment
                                                              1. Thread Source Type
                                                                1. Adversarial

                                                                  Annotations:

                                                                  • threads from individuals , groups, organizations, nations
                                                                  1. Accidental

                                                                    Annotations:

                                                                    • actions with out malicious intend 
                                                                    1. Environmental

                                                                      Annotations:

                                                                      • natural disaster, human - aided
                                                                      1. Structural

                                                                        Annotations:

                                                                        • software hardware failures
                                                                      2. Risk Analysis

                                                                        Annotations:

                                                                        • Examine the dangers poses by the disasters or human involved actions
                                                                        1. Quantitative Risk Analysis
                                                                          1. Qualitative Risk Analysis
                                                                          2. Mitigations
                                                                            1. Accept the risk and periodically reassess
                                                                              1. Reduce the risk by implementing controls

                                                                                Annotations:

                                                                                • by providing updates and patches
                                                                                1. Avoid risk by changing approach totally
                                                                                  1. Transfer the risk to 3rd party

                                                                                    Annotations:

                                                                                    • hire specialist 
                                                                                2. Security Controls
                                                                                  1. Control types
                                                                                    1. Administrative Control

                                                                                      Annotations:

                                                                                      • determine how people acts consists with policies and procedures
                                                                                      1. Technical Control

                                                                                        Annotations:

                                                                                        • -involved software and hardware - manage risks and provide protections
                                                                                        1. Physical Control

                                                                                          Annotations:

                                                                                          • separate people or other threats from system
                                                                                        2. Functional security Controls
                                                                                          1. Preventive Control

                                                                                            Annotations:

                                                                                            • prevent unauthorized and unwanted activities happen
                                                                                            1. Deterrent Control

                                                                                              Annotations:

                                                                                              • discourage before something happens
                                                                                              1. Detective Control

                                                                                                Annotations:

                                                                                                • identifies the different type of unauthorized activities 
                                                                                                1. Corrective Control
                                                                                                  1. Recovery Control
                                                                                                    1. Compensative control

                                                                                                      Annotations:

                                                                                                      • alternative solutions 
                                                                                                  Show full summary Hide full summary

                                                                                                  Similar

                                                                                                  CCNA Security 210-260 IINS - Exam 3
                                                                                                  Mike M
                                                                                                  CCNA Security 210-260 IINS - Exam 1
                                                                                                  Mike M
                                                                                                  CCNA Security 210-260 IINS - Exam 2
                                                                                                  Mike M
                                                                                                  Life in Germany
                                                                                                  Ben C
                                                                                                  Treaty of Versailles (1919)
                                                                                                  Inez Simpson
                                                                                                  George- Of mice and men
                                                                                                  Elinor Jones
                                                                                                  “The knower’s perspective is essential in the pursuit of knowledge.” To what extent do you agree with this statement?
                                                                                                  Lucia Rocha Mejia
                                                                                                  Project Scope Management Process
                                                                                                  neeshar
                                                                                                  Physics - Electricity
                                                                                                  dana-howbridge
                                                                                                  AQA AS Biology - Pathogens and Disease
                                                                                                  dillyrules
                                                                                                  unit 1 f321 chemistry ocr
                                                                                                  methmip