Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Other

Managing Risk in Information Systems

Rating
-
Sold
-
Pages
528
Uploaded on
16-08-2021
Written in
2021/2022

Managing Risk in Information Systems

Institution
Course

Content preview

Managing Risk in Information
Systems,
2nd Edition

by Gibson
Publisher: Jones & Bartlett Learning

,PART ONE
Risk Management Business Challenges

CHAPTER 1 Risk Management Fundamentals

CHAPTER 2 Managing Risk: Threats, Vulnerabilities, and
Exploits

CHAPTER 3 Maintaining Compliance

CHAPTER 4 Developing a Risk Management Plan

, CHAPTER
1 Risk Management Fundamentals


RISK MANAGEMENT IS IMPORTANT to the success of every
company—a company that takes no risks doesn’t thrive. On the other hand,
a company that ignores risk can fail when a single threat is exploited.
Nowadays, information technology (IT) systems contribute to the success of
most companies. If you don’t properly manage IT risks, they can also
contribute to your company’s failure.
Effective risk management starts by understanding threats and
vulnerabilities. You build on this knowledge by identifying ways to mitigate
the risks. Risks can be mitigated by reducing vulnerabilities or reducing the
impact of the risk. You can then create different plans to mitigate risks in
different areas of the company. A company typically has several risk
mitigation plans in place.
This text can help you build a solid foundation in risk management as it
relates to information system security. It won’t make you an expert. Many
of the topics presented in a few paragraphs in this text can fill entire
chapters or even entire books. The more you learn, the closer you’ll be to
becoming the expert whom others seek out to solve their problems.
Chapter 1 Topics
This chapter covers the following topics and concepts:
• What risk is and what its relationship to threat, vulnerability, and loss is
• What the major components of risk to an IT infrastructure are
• What risk management is and how it is important to the organization
• What some risk identification techniques are
• What some risk management techniques are
Chapter 1 Goals
When you complete this chapter, you will be able to:
• Define risk
• Identify the major components of risk
• Describe the relationship among threats, vulnerabilities, and impact
• Define risk management
• Describe risk management’s relationship with profitability and
survivability

, • Explain the relationship between the cost of loss and the cost of risk
management
• Describe how risk is perceived by different roles within an organization
• Identify threats
• List the different categories of threats
• Describe techniques to identify vulnerabilities
• Identify and define risk management techniques
• Describe the purpose of a cost-benefit analysis (CBA)
• Define residual risk

What Is Risk?
Risk is the likelihood that a loss will occur. Losses occur when
a threat exposes a vulnerability. Organizations of all sizes face risks.
Some risks are so severe they cause a business to fail. Other risks are minor
and can be accepted without another thought. Companies use risk
management techniques to identify and differentiate severe risks from
minor risks. When this is done properly, administrators and managers can
intelligently decide what to do about any type of risk. The end result is a
decision to avoid, share or transfer, mitigate, or accept a risk.
NOTE
The Official (ISC)2 Guide to the SSCP CBK provides a more technical definition of
risk. Risk is “a function of the likelihood of a given threat source’s exercising a
potential vulnerability, and the resulting impact of that adverse event on the
organization.” If you’re not familiar with the alphabet soup, the (ISC)2 System
Security Certified Practitioner (SSCP) certification includes seven domains that are
derived from a common body of knowledge (CBK).
The common themes of these definitions are threat, vulnerability, and loss.
Even though the common body of knowledge (CBK)—see note—doesn’t
specifically mention loss, it implies it. Here’s a short definition of each of
these terms:
• Threat—A threat is any activity that represents a possible danger.
• Vulnerability—A vulnerability is a weakness.
• Loss—A loss results in a compromise to business functions or assets.
NOTE
Threats and vulnerabilities are explored in much more depth later in this chapter.
Risks to a business can result in a loss that negatively affects the business. A
business commonly tries to limit its exposure to risks. The overall goal is to

Connected book

Written for

Course

Document information

Uploaded on
August 16, 2021
Number of pages
528
Written in
2021/2022
Type
OTHER
Person
Unknown

Subjects

$25.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Themanehoppe American Intercontinental University Online
Follow You need to be logged in order to follow users or courses
Sold
343
Member since
4 year
Number of followers
224
Documents
3784
Last sold
1 day ago

3.5

55 reviews

5
25
4
7
3
7
2
3
1
13

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions