IT Examiner School

Performing Risk Analysis The process used to identify and understand risks to confidentiality, integrity, and availability • Requires: 1. Identifying assets 2. Identifying vulnerabilities 3. Identifying threats 4. Determining risks, Risk Treatment, Monitor & Manage • Evaluate cost of safeguards vs. cost of loss • Cost of loss is guide for security budget • If annualized cost of safeguards is greater than cost of loss, it is not worth it. Perhaps better to: • Accept the risk • Transfer risk (insurance)

7

Risk Treatment (Controls) Physical controls • “I am physically securing the asset…” • Doors, locks, keys, fences Administrative controls • “I am telling you…” • Policies • Security • Acceptable use • Staff screening and training Technical controls • “I am implementing technology to control…”

• Firewalls and intrusion detection/prevention systems • Authentication systems

8

Made with FlippingBook Digital Publishing Software