Grin logo
en de es fr
Shop
GRIN Website
Texte veröffentlichen, Rundum-Service genießen
Zur Shop-Startseite › BWL - Informationswissenschaften, Informationsmanagement

Implementing a Best Practice Risk Assessment Methodology

Titel: Implementing a Best Practice Risk Assessment Methodology

Fachbuch , 2013 , 37 Seiten

Autor:in: Eric Vanderburg (Autor:in)

BWL - Informationswissenschaften, Informationsmanagement
Leseprobe & Details   Blick ins Buch
Zusammenfassung Leseprobe Details

Risk assessments play a critical role in the development and implementation of effective information security programs and help address a range of security related issues from advanced persistent threats to supply chain concerns.
The results of risk assessments are used to develop specific courses of action that can provide effective response measures to the identified risks as part of a broad-based risk management process.
The guidance provided here uses the key risk factors of threats, vulnerabilities, impact to missions and business operations, and the likelihood of threat exploitation of weaknesses in information systems and environments of operation, to help senior leaders and executives understand and assess the current information security risks to information technology infrastructure.

Leseprobe


Table of Contents

  • I. Overview
  • II. Scope
  • III. About the author
  • 1 Introduction
    • 2 Risk management.
      • 2.1 Framing risk.
      • 2.2 Assessing risk.
        • 2.2.1 Risk assessment process...
        • 2.2.2 Risk models.....
          • 2.1.2.1 Threat.
          • 2.1.2.2 Vulnerability
          • 2.1.2.3 Likelihood
          • 2.1.2.4 Impact..
          • 2.1.2.5 Aggregation
          • 2.1.2.6 Uncertainty.
        • 2.2.3 Risk assessment approaches
          • 2.2.3.1 Quantitative....
          • 2.2.3.2 Qualitative.
          • 2.2.3.3 Hybrid.
        • 2.2.4 Risk analysis approaches
          • 2.2.4.1 Threat oriented.
          • 2.2.4.2 Asset oriented
          • 2.2.4.3 Vulnerability oriented..
        • 2.3 Responding to risk.
        • 2.4 Monitoring risk .
      • 3 Preparing for the risk assessment.
        • 3.1 Purpose...
        • 3.2 Scope
        • 3.3 Assumptions.
        • 3.4 Information sources
        • 3.5 Roles and Responsibilities
      • 4 Conducting the risk assessment.
        • 4.1 Risk assessment scope..
        • 4.2 Risk Assessment Process
          • 4.2.1 Collect information.
          • 4.2.2 Identify systems or processes at risk.
          • 4.2.3 Evaluate the likelihood of harm occurring.
          • 4.2.4 Evaluate the impact.
          • 4.2.5 Determine risk for the item.....
          • 4.2.6 Investigate options for eliminating or controlling risks...
          • 4.2.7 Prioritize action and decide on control measures.
          • 4.2.8 Implement controls.
          • 4.2.9 Measure the effectiveness of implemented actions.
        • 4.3 Assessing risks at organizational level.………………………..\n4.4 Assessing risks at the business process level.
        • 4.5 Assessing risks at the information system tier
        • 4.6 Communicating risk information.......

      Objectives and Key Themes

      This document aims to provide a practical and comprehensive methodology for conducting information technology risk assessments. The focus is on developing a best practice approach that can be implemented by organizations of all sizes.
      • Implementing a best practice risk assessment methodology.
      • Addressing the importance of information security programs and their role in managing risks.
      • Developing effective response measures to identified risks through a risk management process.
      • Understanding and assessing information security risks to information technology infrastructure.
      • Providing guidance that is flexible and adaptable to various organizational needs.

      Chapter Summaries

      The document starts by outlining the importance of information security programs and risk assessments within a broader risk management framework. This involves defining key risk factors like threats, vulnerabilities, impacts, and likelihood of exploitation. The authors then detail the various risk assessment models and approaches available, covering both quantitative and qualitative techniques. The chapter further delves into different risk analysis strategies, such as threat-oriented, asset-oriented, and vulnerability-oriented approaches.

      The document progresses by outlining the steps involved in preparing for a risk assessment. This includes defining the purpose, scope, assumptions, identifying information sources, and clarifying roles and responsibilities. The final chapter delves into the practical steps of conducting a risk assessment. This involves collecting information, identifying systems or processes at risk, evaluating the likelihood of harm occurring, assessing the impact, determining the risk for the item, and investigating options for control measures. The chapter concludes by emphasizing the need to prioritize actions, implement controls, and measure the effectiveness of these actions.

      Keywords

      The primary focus of this document is information technology risk assessment, with a focus on information security programs, risk management methodologies, risk models, risk assessment approaches, and risk analysis strategies. The document also discusses threats, vulnerabilities, impact assessment, likelihood evaluation, control measures, and the communication of risk information within an organization.
Ende der Leseprobe aus 37 Seiten  - nach oben

Details

Titel
Implementing a Best Practice Risk Assessment Methodology
Autor
Eric Vanderburg (Autor:in)
Erscheinungsjahr
2013
Seiten
37
Katalognummer
V282608
ISBN (eBook)
9783656820468
ISBN (Buch)
9783656820451
Sprache
Englisch
Schlagworte
implementing best practice risk assessment methodology
Produktsicherheit
GRIN Publishing GmbH
Arbeit zitieren
Eric Vanderburg (Autor:in), 2013, Implementing a Best Practice Risk Assessment Methodology, München, GRIN Verlag, https://www.grin.com/document/282608
Blick ins Buch
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
Leseprobe aus  37  Seiten
Grin logo
  • Grin.com
  • Zahlung & Versand
  • Impressum
  • Datenschutz
  • AGB
  • Impressum