Security Mgt U5, risk analysis & mgt (part 2)

Description

IYM001 Mind Map on Security Mgt U5, risk analysis & mgt (part 2), created by jjanesko on 13/04/2013.
jjanesko
Mind Map by jjanesko, updated more than 1 year ago
jjanesko
Created by jjanesko about 11 years ago
96
20

Resource summary

Security Mgt U5, risk analysis & mgt (part 2)
  1. stages of the risk analysis and management process
    1. stage 1
      1. What is the value of the information being processed?
        1. costs of assets
          1. replacement costs
            1. for software: only valued insofar as it provides competitive advantage
            2. what devalues assets?
              1. modification
                1. unavailability
                  1. disclosure
                    1. destruction
                      1. communication interference
                    2. What parts of the system support which business processes?
                      1. identify assets
                      2. stage 2
                        1. identify threats, vulnerabilities and risk
                          1. What threats affect the system?
                            1. How vulnerable are our systems?
                              1. What conclusions can be reached about the risks to our security?
                                1. assessing a new system for risk
                                  1. I do have a similar system.
                                    1. use stats from this system
                                    2. I don't have a similar system.
                                      1. seek industry stats or best guess
                                    3. types of threats
                                      1. logical
                                        1. communications
                                          1. technical failures
                                            1. human errors
                                              1. physical
                                              2. types of vulnerabilities
                                                1. facilities and functionalities
                                                  1. system dependence
                                                    1. design
                                                2. stage 3
                                                  1. How can the identified risks be met?
                                                    1. countermeasures
                                                      1. kinds
                                                        1. 1. avoid
                                                          1. 2. transfer
                                                            1. 3. reduce threat
                                                              1. 4. reduce vulnerability
                                                                1. 5. reduce impact
                                                                  1. 6. detect
                                                                    1. 7. recover
                                                                    2. review and mark countermeasrues
                                                                      1. installed
                                                                        1. not applicable
                                                                          1. under consideration
                                                                            1. requires management consultation to determine whether or not this countermeasure is applicable or not
                                                                          2. prioritization
                                                                            1. already in place
                                                                              1. covers many threats
                                                                                1. required
                                                                                  1. low cost high effectiveness
                                                                              2. What improvements can be made to existing security?
                                                                                1. gap analysis
                                                                                  1. highlights countermeasures that are not in place
                                                                            Show full summary Hide full summary

                                                                            Similar

                                                                            Security Mgt, ISO 27001, PDCA
                                                                            jjanesko
                                                                            Exemplary Assignment Answers
                                                                            jjanesko
                                                                            Security Mgt, Flashcards for ISO 27000 series
                                                                            jjanesko
                                                                            Security Mgt U5, risk analysis and mgt (part 1)
                                                                            jjanesko
                                                                            Security Mgt U8, Information Assurance
                                                                            jjanesko
                                                                            Security Mgt U3, BS7799 (Part 2)
                                                                            jjanesko
                                                                            Security Mgt U5, quantitative risk assessment forumula (image)
                                                                            jjanesko
                                                                            Security Mgt U8, Incident Recovery Image
                                                                            jjanesko
                                                                            Security Mgt U3, BS7799 (Part 1)
                                                                            jjanesko
                                                                            Security Mgt U5, Risk Analysis Methods and Tools (image)
                                                                            jjanesko
                                                                            Security Mgt U10, Scope of Incident Response (chart)
                                                                            jjanesko