Risk Analysis And Risk Management

Great Essays
For an organization to successfully enforce its security program, it must take risk analysis and risk management into consideration. A risk analysis will identify potential threats and vulnerabilities of the systems and any existing related risks. Applying threat modeling to analyze the security of an application by identifying, quantifying, rating, and addressing the threats is crucial for the organization to prevent and mitigate any threats. Since risk is calculated by multiplying the threat by the vulnerability, the higher the threat, the higher the risk an organization may have to suffer. If the threat is zero, the risk is zero. It is important to rate the threat and risks from the lowest to the highest so we can address and fix the ones …show more content…
Risk management can be done by: (1) developing and implementing a risk management plan, (2) implementing security measures, and (3) evaluating and maintaining security measures (CMS, 2007). Risk analysis and risk management are ongoing processes; therefore, constant re-evaluation and monitoring are required to mitigate the …show more content…
This assessment draws attention not only the vulnerabilities that are present within the current system, but also offers solutions in order for the application to implement a defense in depth technological infrastructure regarding the new additions to the access control and authentication factors of the application database. iTrust at the moment is infected with bugs and access control issues that consequently compromise the PII of not only the employees that use the system for organizational purposes, but also patients whose sensitive information is installed within a database. Before the new requirements of application are implemented, it is recommended that the database application goes through a temporary disconnect of network traffic and access in order to close or mitigate common bugs that are present in the system. iTrust would also benefit from the implementation of an intrusion detection system in order to acknowledge, analyze and prevent anomalies or malicious network traffic. For the login information of the website, it is recommended that employees and patients that are responsible for PII be required to implement multi-factor authentication to allow for the iTrust application to successfully authorize the appropriate users to access sensitive medical

Related Documents

  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Evaluate the risk and create policies and procedures to negate or reduce them. Educate and communicate with management and staff about risk factors. Rank risks according to likelihood of occurrences for each dept. Periodically review and update risks, and risks management programs. (Rubbens, 2007)…

    • 819 Words
    • 4 Pages
    Improved Essays
  • Brilliant Essays

    (2006, February). Special Publication 800-18 REV 1: Guide For Developing Security Plans For Information Technology Systems. Retrieved October 30, 2015 from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf NIST - National Institute of Standards and Technology. (2012, September). Special Publication 800-30 REV 1: Guide for Conducting Risk Assessments.…

    • 1450 Words
    • 6 Pages
    Brilliant Essays
  • Superior Essays

    Additionally, deliberate and comprehensive risk management makes the economy, resources, the nation, and way of life more flexible through anticipating, corresponding, and preparing for both external and internal hazards. The significance of a risk management strategy is in the capability to differentiate between diverse choices in larger context rather than in the endorsement of a particular action response. Risk management is vital for the leaders of homeland security in prioritizing contending requirements and permitting comprehensive approaches to determine performance and specify…

    • 1169 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    R (Risk) equals the overall risk itself, T (Threat) equals likelihood of an attack occurring, V (Vulnerability) & C (Consequence) equals the relative exposure and expected impact of an attack. Again, the purpose of this formula is provide a list of viable target locations and the type of an attack that could take place. Once this piece of the puzzle is figured, Department of Homeland Security develops a strategic plan, determines the mission set needed to obtain their goal, allocates funding, and implements the plan into operations across the nation; in hopes of minimizing the…

    • 1238 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Risk Assessment Definition

    • 1802 Words
    • 8 Pages

    What are the risk to doing this?” Every day the Department of Homeland Security is doing this risk assessment on everything in its control. These assessments are being done on facilities, areas, events and personnel that it is ultimately responsible for. The Department of Homeland Security has a formula to assign a level to the assessments being done. Risk Assessment Basics…

    • 1802 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    P3: Describe how software and network security can keep systems and data secure In every single large organisation, security of data and system are very important. I will describe how network security and software are able to keep the data and systems secure. I will write about alternative network security methods and software which every single company should use. I will also explain these terms to show a better understanding of how important it is ti protect data and system which an organisation is working with.…

    • 1134 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Market Risk Analysis

    • 829 Words
    • 4 Pages

    Risk can be measured in two ways namely, the market risk and specific risk. The market risk and specific risk are the components that make up the total risk of any investment. Market risk and specific risk are two different forms of risk that affect assets. Market risk is also referred to as systematic risk and it affects a large number of asset classes (Nickolas, 2015).…

    • 829 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Identifying and managing risks is a critical responsibility of project managers. Risk is defined as the probability of a specified threat and the subsequent impact that the event produces (Vaidyanathan, 2013). Risks can also bring about either positive or negative outcomes for a project or organization. A project manager must identify potential risks and evaluate each one to determine the severity and likelihood of each event. Only by completing the risk management process, a project manager can determine what approach would work best to avoid, mitigate, and/or transfer the risk.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The following steps will be committed to maintain risk management: maintained standard level of procedures with every customer, written confirmation of procedures, kepp action logs, keep record of transactions, utilising checklists, maintain…

    • 944 Words
    • 4 Pages
    Great Essays
  • Great Essays

    When dealing with the term risk we think about uncertainty, the unknown and probability, how likely it is that such an event will occur. Risk management can be about other elements rather than just associated with firms and industries. Every day people are managing risks and trying to deal with risk, which portrays…

    • 1358 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Authorization and privileges are created and granted, which will include which part of the system will be user interfaces and interaction, how to keep all security controls, and threats are identified. In the implementation phase, vulnerabilities and threats are now looked for in the code in the structural errors and input errors (Howard, 2005). Testing of the code is the best way to perform this task. In the verification phase, it will include a final security check that will review all code that interacts with all attacks surfaces found in the design phase. Lastly, a security review is done, where the security measures are explained in terms of the end client’s stances and what and how the product is setup to withstand attacks in the future (Howard, 2005).…

    • 1189 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    After the level of each risk is defined it becomes possible to prioritize the risk that needs treatment and are managed according to their risk levels from high to low. The defined risk level for the various identified risks can be categorized into catastrophic level, high level, moderate level and minute level. (Jensen…

    • 1227 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    4. Information Security Metrics Security metrics are important to measure and evaluate the effectiveness of the security measures, and are required to provide a quantitative and unbiased basis for security operations since they aid in decision making and maintenance of security operations within an organization (Moeti & Kalema, 2014). These metrics help determine if the security components meet their objectives and also avoid doing what they weren’t intended to do. Thus, security and risk metrics play a very important role in assessing the actual state of the system security (Moeti & Kalema, 2014). 4.1 Baseline Metric Framework Meaningful metrics are required to uniquely measure results specific to a security control and determine if it meets the security control process objectives (Hajdarevic & Allen, 2013).…

    • 712 Words
    • 3 Pages
    Improved Essays