Every organization carries out tasks to satisfy business objectives. Without objectives, organizations have no purpose. You must identify the elements in your organization that support your business objectives.These elements are your organization’s business drivers. Business drivers include people, information, and conditions that support business objectives. Information security activities directly support several common business drivers, including compliance and efforts to protect intellectual property. Security activities can also negatively affect business drivers, making it more difficult to satisfy your business objectives.Always consider different controls to satisfy compliance requirements. It’s important that you balance security activities with their impact on your business drivers to protect your information’s security. In this chapter, you will learn about security-related business drivers and how they support your overall business drivers.Defining Risk Management- Risk management is responding to a negative event when it occurs.- Risk management is the process of identifying, assessing, prioritizing, and addressing risks. - Risk management is not something you do just once. - Risk management ensures that you have planned for risks that are most likely to have an effect on your organization. - Risk is the probability that an uncertain event will affect one or more resources. The effects of risk can be positive or negative. - PMI bases its risk-management philosophy on a proactive approach, which simultaneously does the following:• Minimizes the effects of negative risks• Maximizes the effects of positive risksRisk = Threats x Vulnerabilities- A threat is the frequency of any event. - Vulnerability is the likelihood that a specific threat will successfully be carried out. Multiplying the probability of a threat and the likelihood of a vulnerability yields the risk of that particular event. - Risks apply to specific assets. The result is the exposure to a specific risk.- A risk methodology is a description of how you will manage risk. The risk methodology that your organization adopts should include the approach, the required information, and the techniques to address each risk. The approach defines how you will carry out the steps of the risk-methodology process. While the PMI approach isn’t the only way to do things, it does provide a prescriptive approach to project management in general, including risk management.- The process of managing risks starts by identifying risks. According to PMI, the steps in the risk-management process are as follows:• Risk identification• Risk analysis• Risk-response planning• Risk monitoring and control- A threat is an opportunity to exploit a vulnerability- An exploited vulnerability results in an impact1. Risk identificationRisk identification is the process of determining and classifying the risks that might affect your resources. The ability to identify risks is a key part of an effective risk-management process. Identifying risks should involve as many people working in different roles as possible. Having more people involved enables you to identify risks from multiple perspectives.The result of the risk identification process is a list of identified risks. PMI calls this list the risk register. The risk register can contain many different types of information, but should contain at least the following:• A description of the risk• The expected impact if the associated event occurs• The probability of the event occurring• Steps to mitigate the risk• Steps to take should the event occur• Rank of the riskThis goal is to document as many risks as possible. You can collect input for the risk register in several ways, including the following:• Risk-identification brainstorming meetings• Formal surveys• Informal polls and requests for comments• Incentivized events, such as “lunch and learn” sessions that include a forum for collecting comments and feedbackThe Delphi methodĐây là một cách tiếp cận để sử dụng khảo sát ý kiến chính thức ẩn danh trong vòng nhiều để thu thập ý kiến và thông tin. Bởi vì các cuộc khảo sát vô danh, các phương pháp khuyến khích trả lời thẳng thắn. Một bảng đánh giá mỗi vòng phản ứng khảo sát và tạo ra một cuộc khảo sát mới dựa trên các kết quả của các vòng trước. Nhiều viên đạn cho phép bạn tập trung vào các lĩnh vực quan tâm và lắp ráp các chi tiết thông tin từ một số vấn đề các chuyên gia.2. phân tích rủi roBước đầu tiên là để xác định những gì, và nơi mà các tài sản s tổ chức được đặt. Bước tiếp theo là để phân tích các rủi ro được xác định trong vòng bảy lĩnh vực cơ sở hạ tầng CNTT để quyết định làm thế nào để xếp hạng chúng. Tất cả các tổ chức có giới hạn ngân sách. Họ không thể đáp ứng mọi rủi ro tiềm tàng. Phân tích rủi ro cho phép tổ chức để quyết định những rủi ro mà đòi hỏi sự chú ý hơn so với những người khác.a. phân tích rủi ro định tínhPhân tích rủi ro định lượng sử dụng bảng xếp hạng tương đối để determ
đang được dịch, vui lòng đợi..
