Introduction to risk management and its component, Computer Network Security

Assignment Help:

INTRODUCTION TO RISK MANAGEMENT

Risk management is the procedure of identifying and controlling risks facing an organization. Risk management is the discipline which is employed for identifying, monitoring and limiting risks. In some of the cases the acceptable risk can be near zero. Risks can occur from accidents, natural calamities and disasters as well as deliberate attacks from an adversary. The several components of risk management and their relationship to each other are shown in Figure given below.2.1.The main ISO standards on risk management include in businesses, risk management organized activity to manage threats and uncertainty and involves people following procedures and by using tools in order to ensure conformance with risk management policies
 
Components of Risk Management

The whole process is made up of 2 major components. They are

• Risk identification is the procedure of examining and documenting an organization’s present information technology security situation.
• Risk control is the procedure of applying controls to reduce risks to an organizations data and information system.

Risk management is used in the public sector to identify and mitigate the risk to critical infrastructure. These methodologies comprise of the following elements, performed in the following order.

• identify assets and identify which are the most critical
• identify, characterize, and assess the threats
• assess vulnerability of critical assets to specific the threats
• determine the risk (that is the expected consequences of specific types of attacks on specific assets)
• identify the methods to reduce those risks
• prioritize the risk reduction measures based on strategy

 

 

1319_component of risk management.png


Related Discussions:- Introduction to risk management and its component

Describe the two possible configurations for 3des, QUESTION (a) Describ...

QUESTION (a) Describe the two possible configurations for 3DES (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d

Potential risks to information systems, Information System Security 1. ...

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t

Limitations of ethical dilemma, The best results obtained in the PIIT class...

The best results obtained in the PIIT classes have been when the technique has been used in tutorial groups, rather than have students submit individual reflections on particular c

How will network datagrams be protected at network layer, (a) Consider the...

(a) Consider the subsequent authentication options: A. Using password. B. Using pin and fingerprint Which option A or B provides stronger security and why? (b) Give

Discuss a communication channel, Question An organization is planning t...

Question An organization is planning to connect its networks to the Internet. The network is located within a four story building. A web server supporting online sales is also

It service support within the itil framework, Problem (a) IT Service Suppo...

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M

Example bus network , Ethernet is a commonly used LAN technology. It was di...

Ethernet is a commonly used LAN technology. It was discovered at EXROX PARC(Palo Alto Research Center) in 1970s.Xerox, Intel and Digital described it in a standard so it is also kn

How does tcp perform the functions, Problem: (a) Assume that a new ap...

Problem: (a) Assume that a new application layer protocol is developed for video conferencing application. Which transport layer protocol, between TCP and UDP, will you u

Explain the limitations of a firewall, Question: (a) Mention three lim...

Question: (a) Mention three limitations of a firewall. (b) Compare packet-filtering and proxy-base firewalls. Give advantages and drawbacks of both. (c) "Proxies eff

Describe the role of dns root servers in network, QUESTION (a) Describ...

QUESTION (a) Describe the role of DNS root servers in the Internet network. (b) What do you understand by the handover concept in a mobile network? (c) List five meth

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd