Characteristics Of Good Risk Scenarios

Improved Essays
Characteristics of Good Risk Scenarios
It is very important for risk scenarios to be realistic and unbiased so that the management feel assured while taking decisions. According to COBIT (2014), a risk scenario should have the following characteristics to add real value to risk analysis.
• Relevance – Scenarios should be result in derivation of meaningful information that would help support decision making. The scenarios needs to be customized as per the market and industry in which the organization operates to improve the relevance of the scenario.
• Consistency – Each scenario must be complete and convincing by itself.
• Plausibility – The risk scenarios should be believable.
• Likelihood – There should be certain probability for the scenario
…show more content…
Reporting

The success of a security and risk metric framework is dependent on effective reporting of the measurement of various metrics. If these metrics are not clearly understood by the stakeholders involved then the framework is considered to be ineffective. Different stakeholders have different expectations from metrics gathered. Hence, it is important to customize the reports based on their expectations. This ensures effective utilization of the reports generated.

6.1 Tiered Reporting Model

Adopting a tiered reporting model would be an effective method to present the information to different audiences in an organization. For example, the senior leadership at the top tier of an organization would be more interested to know about costs and benefits associated with implementing information security controls, while a middle tier manager would be more concerned about the effectiveness of controls implemented (Pironti,
…show more content…
But, the constantly evolving information security landscape makes it challenging for organizational leaders to formulate strategies and rationalize investments needed to mitigate new risks and threats. Hence, it is critical for organizations to regularly re-evaluate the security metrics and measures that have been established to assess the effectiveness of the security controls and the information security program. Having a flexible and adaptable metrics and measures that will help organizations identify new threats and vulnerabilities and ensures effectiveness of their security

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    V-Care Security Solutions

    • 150 Words
    • 1 Pages

    Our present day security solutions involve threat assessment, surveillance and analytics, automated access and access control systems and a number of biometric and other devices that ensure that lives are protected keeping threats out of range. Security solutions apply to intellectual property that ranges from trade secrets to highly qualified people. It involves information systems on one hand…

    • 150 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    1. Purpose After several security incidents Greiblock Credit Union (GCU) Board of Directors needs a sound policy to address the situation. The main objective of this document is to improve the security culture of the organization. The specifications of this policy will address dynamic vulnerability analysis, intrusion detection, and incident response.…

    • 1879 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    This is mainly due to the rising amount of technology being used in the industry. Financial institutions are one of the most affected industries of data breaches, fraud, and cyberattacks. NormShield focuses in on proactive solutions in combatting cybercrime in this industry and addresses the ever-growing problem of confidentiality and accessibility. Our Continuous Perimeter Monitoring allows for these institutions to constantly know the vulnerabilities their platforms have. How Does NormShield Help?…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    ENTERPRISE SYSTEMS SECURITY INT7223 Research Paper On Information Security - Current Event Submitted by: Sowmya Tiruchengode Yegyanarayanan 000717417 10/06/2014 INTRODUCTION We are living in a delicate world filled with threat to sensitive information, materialistic properties and even to human soul that possess it.…

    • 954 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    It is important to remember that protecting the homeland from terrorism is extremely expensive and time sensitive. That is all the more reason to comprehend the importance of the risk management formula. Moreover, it’s crucial to assess the threats and the vulnerabilities of the targets in order to determine which target and threat is more important at the…

    • 1238 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    ATO Personal Statement

    • 694 Words
    • 3 Pages

    I am an IT Security Analyst in Enterprise Solutions and Technology’s (EST) Information and Cyber Security Management stream. In this role, I advise internal and external stakeholders about the ATO’s approach to contemporary risk management for corporate security practices and emerging technology My awareness of the ATO’s security posture and risk appetite is supplemented by knowledge I have gained from formal Information Security accreditations and industry conventions. I apply this proficiency to represent my team as a subject matter expert across various security services, such as: security intelligence and monitoring; policies, education and support; and governance reporting. In doing so, I promote enhanced information management and security…

    • 694 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Security Metrics

    • 532 Words
    • 3 Pages

    Problems in developing security metrics efforts include the Trusted Computer System and the Security Systems Engineering Capability Maturity Model. These agreements have met with limited success. Their opinion suggests some key factors that need to be addressed by safety…

    • 532 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction The reason for the article is to stress the importance of information security to any organization. The problem presently is that many organizations either do not have enough security or they have a lack of interest in the security measures as it pertains to their individual organization. The solution to this is that organizations must ensure they have a proper balance and remain vigilant at all times. This means remaining flexible as well as adaptable to the situation of the day.…

    • 967 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    How much information should be provided? The type of information and the level of detail to be provided will vary according to the level of governing. For example, at the program level in the health field, program managers may want to know hospital bed utilization rates; at the government level, legislators and taxpayers may want to know how the decision to locate a facility was made; and at the societal level, legislators and citizens may want to know what the health goals are for the Province. We believe the information needed to answer these and similar questions are the same as that required for effective management.…

    • 454 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    In this paper I will discuss the pivotal role Risk Management plays in modern organisations. The organisation that I will discuss is Volkswagen. I will use their emission scandal to convey the importance of Risk management. Risk management can have numerous definitions, it can be perceived and interpreted by firms and industries in different ways. When dealing with the term management it is clear the concept of control is important.…

    • 1358 Words
    • 6 Pages
    Great Essays