jagomart
digital resources
picture1_Business Ppt Templates 73017 | Aspek Keamanan Dan Kerahasiaan Sirs Pertemuan 4


 120x       Filetype PPTX       File size 1.54 MB       Source: bahan-ajar.esaunggul.ac.id


File: Business Ppt Templates 73017 | Aspek Keamanan Dan Kerahasiaan Sirs Pertemuan 4
the purpose of risk management ensure overall business and business assets are safe protect against competitive disadvantage compliance with laws and best business practices maintain a good public reputation steps ...

icon picture PPTX Filetype Power Point PPTX | Posted on 31 Aug 2022 | 3 years ago
Partial capture of text on file.
 The purpose of risk management
  Ensure overall business and business assets are safe 
  Protect against competitive disadvantage
  Compliance with laws and best business practices
  Maintain a good public reputation 
 Steps of a risk management plan
  Step 1: Identify Risk
  Step 2: Assess Risk
  Step 3: Control Risk
  Steps are similar regardless of context (InfoSec, Physical 
  Security, Financial, etc.)
  This presentation will focus on controlling risk within an 
  InfoSec context
  Risk Identification
        The steps to risk identification are:              Asset          Asset Type     Asset         Priority Level 
                                                                          and            Function      (Low, 
            Identify your organization’s                                  Subcategory                  Medium, 
                                                                                                       High, 
            information assets                                                                         Critical)
                                                           Bob Worker     Personnel:     •  Secure     Low
            Classify and categorize said assets                           InfoSec           Networks
            into useful groups                                                           •  Penetrati
                                                                                            on 
            Rank assets necessity to the                                                    Testing
            organization                                                                 •  Make 
                                                                                            coffee
      To the right is a simplified example of              Cisco UCS      Hardware:      •  Database  High
      how a company may identify risks                     B460 M4        Networking        Server
                                                           Blade Server
                                                           Customer       Data:          •  Provide    Critical
                                                           Personally     Confidential      informatio
                                                           Identifiable   Information       n for all 
                                                           Information                      business 
                                                           (PII)                            transactio
                                                                                            ns
                                                           Windows 7      Software:      •  Employee  Medium
                                                                          Operating         access to 
                                                                          System            enterprise 
                                                                                            software
  Risk Assessment 
                                                                                      Threat          Targeted        Threat          Possible       Risk 
                                                                                      Agent           Asset           Level           Exploits       (Scale of 
           The steps to risk                                                          and                                                            1-5)
           assessment are:                                                            Threat
                Identify threats and threat agents
                Prioritize threats and threat agents                                  Disgruntle      Company         High            Access         4.16
                                                                                      d Insider:      data (i.e.                      control 
                Assess vulnerabilities in current                                     Steal           Customer                        credentials
                InfoSec plan                                                          company         PII)                            , 
                                                                                      informatio                                      knowledge 
                Determine risk of each threat                                         n                                               of InfoSec 
                                                                                      to sell                                         policies, 
        R = P * V – M + U                                                                                                             etc. 
                R = Risk                                                              Fire: Burn      Company         Critical        Mishandle      2.78
                P = Probability of threat attack                                      the facility    Facility,                       d 
                                                                                      down or         Personnel,                      equipment
                V = Value of Information Asset                                        cause           Equipment
                                                                                      major 
                M = Mitigation by current controls                                    damage
                U = Uncertainty of vulnerability                                      Hacktivists     Company         Low             Lack of        1.39
        The table to the right combines elements of                                   : Quality of  Hardware/                         effective 
                                                                                      service         Software                        filtering
        all of these in a highly simplified format                                    deviation
  Risk control 
                  The steps to risk control are: 
              •   Cost-Benefit Analysis (CBA)
                   •  Single Loss Expectancy (SLE)
                   •  Annualized Rate of Occurrence (ARO)
                   •  Annual Loss Expectancy (ALE)
                   •  Annual Cost of the Safeguard (ASG)
              •   Feasibility Analysis
                   •  Organizational Feasibility
                   •  Operational Feasibility
                   •  Technical Feasibility
                   •  Political Feasibility 
              •   Risk Control Strategy Implementation
The words contained in this file might help you see if this file matches what you are looking for:

...The purpose of risk management ensure overall business and assets are safe protect against competitive disadvantage compliance with laws best practices maintain a good public reputation steps plan step identify assess control similar regardless context infosec physical security financial etc this presentation will focus on controlling within an identification to asset type priority level function low your organization s subcategory medium high information critical bob worker personnel secure classify categorize said networks into useful groups penetrati rank necessity testing make coffee right is simplified example cisco ucs hardware database how company may risks b m networking server blade customer data provide personally confidential informatio identifiable n for all pii transactio ns windows software employee operating access system enterprise assessment threat targeted possible agent exploits scale threats agents prioritize disgruntle d insider i e vulnerabilities in current steal...

no reviews yet
Please Login to review.