Risk Control and Security Management

751 Words2 Pages

1. Introduction In this section, you should briefly introduce the project background and related information. 1.1 Purpose This report aim to explain how is achieved risk control through strategies and through security management of information. 1.2 Objectives Will be described how information assets are evaluated as exposed to risk, and how risk is identified and evaluated. 1.3 Definitions, Acronyms, and Abbreviations "Risk management is the part of analysis phase that identifies vulnerabilities in an organisation`s information system and take carefully reasoned steps to assure the confidentiality, integrity, and availability of all components in the organisation`s information system" (Management of Information Security - second ed, Michael E. Whitman and Herbert J. Mattord) Risk is the potential loss resulting from the balance of threat, vulnerabilities, countermeasures, and value. Vulnerabilities are the weaknesses that allow the threat to exploit you. Countermeasures are the precautions you take. Value is the potential loss you can experience. Nuisance Value is the potential cost of dealing with a loss. Competitor Value is the value of an asset in the eyes of an adversary. Vulnerabilities are the weaknesses that allow the threat to exploit you. When there is a vulnerability for them to exploit, you then have risk. Countermeasures are the precautions that an organization takes to reduce risk. 2. Risk Management Information security is about managing the risk of using information. Risk management implies first risk identification second risk assessment and at end risk control. "Risk management is the process of identifying risk, as represented by vulnerabilities, to an organization’s information assets and infrastructure,... ... middle of paper ... ...an employee resigning, policies to limit user access, etc. " The goal of a security program is then to choose and implement cost effective Countermeasures that mitigate the Vulnerabilities that will potentially lead to loss." (Zen and the art of information security, page 54, Syngress) Minimization of risk implies that you want to remove as much risk, loss, as possible. And this can be achieved through optimization. Risk Optimization line on the graph is showing the point that is determined as the amount of loss likely to happened and is accepted and the cost of the countermeasures that will minimise the risk to that point. Calculate the budget required for those countermeasures. If management chooses not to fund a recommended countermeasure, acceptance must be conscious that the failure to introduce countermeasures will likely create a much larger amount loss.

Open Document