Grin logo
en de es fr
Shop
GRIN Website
Publier des textes, profitez du service complet
Go to shop › Gestion d'entreprise - Sciences de l'information, gestion de l'information

Implementing a Best Practice Risk Assessment Methodology

Titre: Implementing a Best Practice Risk Assessment Methodology

Livre Spécialisé , 2013 , 37 Pages

Autor:in: Eric Vanderburg (Auteur)

Gestion d'entreprise - Sciences de l'information, gestion de l'information
Extrait & Résumé des informations   Lire l'ebook
Résumé Extrait Résumé des informations

Risk assessments play a critical role in the development and implementation of effective information security programs and help address a range of security related issues from advanced persistent threats to supply chain concerns.
The results of risk assessments are used to develop specific courses of action that can provide effective response measures to the identified risks as part of a broad-based risk management process.
The guidance provided here uses the key risk factors of threats, vulnerabilities, impact to missions and business operations, and the likelihood of threat exploitation of weaknesses in information systems and environments of operation, to help senior leaders and executives understand and assess the current information security risks to information technology infrastructure.

Extrait


Table of Contents

  • I. Overview
  • II. Scope
  • III. About the author
  • 1 Introduction
    • 2 Risk management.
      • 2.1 Framing risk.
      • 2.2 Assessing risk.
        • 2.2.1 Risk assessment process...
        • 2.2.2 Risk models.....
          • 2.1.2.1 Threat.
          • 2.1.2.2 Vulnerability
          • 2.1.2.3 Likelihood
          • 2.1.2.4 Impact..
          • 2.1.2.5 Aggregation
          • 2.1.2.6 Uncertainty.
        • 2.2.3 Risk assessment approaches
          • 2.2.3.1 Quantitative....
          • 2.2.3.2 Qualitative.
          • 2.2.3.3 Hybrid.
        • 2.2.4 Risk analysis approaches
          • 2.2.4.1 Threat oriented.
          • 2.2.4.2 Asset oriented
          • 2.2.4.3 Vulnerability oriented..
        • 2.3 Responding to risk.
        • 2.4 Monitoring risk .
      • 3 Preparing for the risk assessment.
        • 3.1 Purpose...
        • 3.2 Scope
        • 3.3 Assumptions.
        • 3.4 Information sources
        • 3.5 Roles and Responsibilities
      • 4 Conducting the risk assessment.
        • 4.1 Risk assessment scope..
        • 4.2 Risk Assessment Process
          • 4.2.1 Collect information.
          • 4.2.2 Identify systems or processes at risk.
          • 4.2.3 Evaluate the likelihood of harm occurring.
          • 4.2.4 Evaluate the impact.
          • 4.2.5 Determine risk for the item.....
          • 4.2.6 Investigate options for eliminating or controlling risks...
          • 4.2.7 Prioritize action and decide on control measures.
          • 4.2.8 Implement controls.
          • 4.2.9 Measure the effectiveness of implemented actions.
        • 4.3 Assessing risks at organizational level.………………………..\n4.4 Assessing risks at the business process level.
        • 4.5 Assessing risks at the information system tier
        • 4.6 Communicating risk information.......

      Objectives and Key Themes

      This document aims to provide a practical and comprehensive methodology for conducting information technology risk assessments. The focus is on developing a best practice approach that can be implemented by organizations of all sizes.
      • Implementing a best practice risk assessment methodology.
      • Addressing the importance of information security programs and their role in managing risks.
      • Developing effective response measures to identified risks through a risk management process.
      • Understanding and assessing information security risks to information technology infrastructure.
      • Providing guidance that is flexible and adaptable to various organizational needs.

      Chapter Summaries

      The document starts by outlining the importance of information security programs and risk assessments within a broader risk management framework. This involves defining key risk factors like threats, vulnerabilities, impacts, and likelihood of exploitation. The authors then detail the various risk assessment models and approaches available, covering both quantitative and qualitative techniques. The chapter further delves into different risk analysis strategies, such as threat-oriented, asset-oriented, and vulnerability-oriented approaches.

      The document progresses by outlining the steps involved in preparing for a risk assessment. This includes defining the purpose, scope, assumptions, identifying information sources, and clarifying roles and responsibilities. The final chapter delves into the practical steps of conducting a risk assessment. This involves collecting information, identifying systems or processes at risk, evaluating the likelihood of harm occurring, assessing the impact, determining the risk for the item, and investigating options for control measures. The chapter concludes by emphasizing the need to prioritize actions, implement controls, and measure the effectiveness of these actions.

      Keywords

      The primary focus of this document is information technology risk assessment, with a focus on information security programs, risk management methodologies, risk models, risk assessment approaches, and risk analysis strategies. The document also discusses threats, vulnerabilities, impact assessment, likelihood evaluation, control measures, and the communication of risk information within an organization.
Fin de l'extrait de 37 pages  - haut de page

Résumé des informations

Titre
Implementing a Best Practice Risk Assessment Methodology
Auteur
Eric Vanderburg (Auteur)
Année de publication
2013
Pages
37
N° de catalogue
V282608
ISBN (ebook)
9783656820468
ISBN (Livre)
9783656820451
Langue
anglais
mots-clé
implementing best practice risk assessment methodology
Sécurité des produits
GRIN Publishing GmbH
Citation du texte
Eric Vanderburg (Auteur), 2013, Implementing a Best Practice Risk Assessment Methodology, Munich, GRIN Verlag, https://www.grin.com/document/282608
Lire l'ebook
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
Extrait de  37  pages
Grin logo
  • Grin.com
  • Page::Footer::PaymentAndShipping
  • Contact
  • Prot. des données
  • CGV
  • Imprint