Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Applying Risk Management Principles: A Practical Guide, Slides of Computer Security

A practical guide to applying risk management principles. It outlines the steps involved in identifying, analyzing, and mitigating risks, and includes examples of common vulnerabilities and their corresponding mitigation strategies. The document also references relevant resources for further study.

Typology: Slides

2017/2018

Uploaded on 10/28/2024

brian-joell
brian-joell 🇺🇸

11 documents

1 / 5

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Applying Risk Management Consulting
Brian Joell
19 June 2018
CMBT/430/Week 2
Ongart Ratchaworap
pf3
pf4
pf5

Partial preview of the text

Download Applying Risk Management Principles: A Practical Guide and more Slides Computer Security in PDF only on Docsity!

Applying Risk Management Consulting Brian Joell 19 June 2018 CMBT/430/Week 2 Ongart Ratchaworap

APPLYING RISK MANAGEMENT PRINCIPLES

Example Sets for Risk

Management

Vulnerability Related Risk Mitigation Opening spam emails Trojan Horses, Malware, Spyware can corrupt or delete data on your computer Ensure firewalls are set and make sure data is encrypted using SSL (Secure Socket Layer) Non-compliance of policies Financial Loss, Damage to reputation, Franchise value and Legal penalties Ensure that employees are given a risk-based ethics and compliance training strategy session that’s intended to educate them about legal and policy documents Thumb Drives Unauthorized use of operating system configurations typically allow most programs (including malicious ones) to run automatically. This is best done by changing the computer's default auto run policies

References

Airmic. (2017). A structured approach to Enterprise Risk Management (ERM) and the requirements of ISO 31000. Theirm.org. Retrieved from https://www.theirm.org/media/886062/ISO3100_doc.pdf Kaplan, R., Mikes, A. (2012, June). Managing Risks: A New Framework. Harvard Business Review. Hbr.org. Retrieved from https://hbr.org/2012/06/managing- risks-a- new-framework NIST. (2010, February). Guide for Applying Management Framework to Federal Information Systems. NIST.com. Retrieved from https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-37r1.pdf