Information Security Program

Improved Essays
1. Information Security Program is the overall effort of the organization, which includes all projects and activities, in relation to the improvement of the information security. It can be viewed as the set of controls that an organization needs to govern. In order for program to be successful, it needs to be have a continuous lifecycle, which means that it never ends. This program has four phases, and they are: Assess, Mitigate, Validate, Sustain.
Phase one: Assess. Vulnerabilities assessment. Take a look at the network, systems, data, and processes and understand where are some weaknesses that need to be addressed. In this phase organization needs to identify the assets (Physical and logical assets, data center, desktops, network devices,
…show more content…
Risk management is the process of identifying the risk, represented in vulnerabilities and threats, to an organization’s information assets, and taking necessary steps in order to reduce the risk to an acceptable level. Risk is the possibility that something bad will happen to the organization’s information asset. To be more specific, risk is the likelihood of the vulnerability to be exploited multiplied by the value of the asset, after security controls were applied to mitigate it. Vulnerability is the weakness that allows exploitation in order to harm organization’s information asset. Threat is anything with potential to harm the organization’s information asset. One of the critical success factors to an information security program is having an Information Risk Management Policy. IRM policy is a map of business objectives to security, management’s support, security goals, and …show more content…
Identifying assets for review is done by the managers of the environment under review. They will also work wit the security project manager. Asset identification and values related to it is the crucial to the business. In this part assets need to be identified especially one critical for the business operations. Assets can be physical or logical like datacenters, desktops, remote systems, network devices, systems that process, manage, and store personal information. This is done by documentation review, interviews with business managers, and technical experts. Evaluate importance of the assets – After assets are identified, certain value needs to be assign to them in terms of how much business impact those assets have. After the value is determined, data needs to be classified by importance, which would further impact risk reduction plan. Further Vulnerabilities need to be identified. This is done by vulnerability scanners, penetration testing, and checklists. After vulnerabilities are identified, we should proceed and identify threats that can harm or affect critical operations and assets. The next step is to develop a Risk Profile which lets us analyze and rank risks according to their impact to the environment. Lastly, risk reduction plan needs to be developed. Here we need to evaluate existing

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This plan will include risk identification and analysis, risk control approaches and the risk response…

    • 1275 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The Federal Information Security Management Act also known as FISMA is United States federal law enactment established to ensure government data, operations and resources against regular or man-made dangers are protected. FISMA was created in 2002 Electronic Government Act of 2002 before cybersecurity became such a vast problem. Modifications were made to FISMA law and renamed Federal Information Security Modernization Act of 2014. The cybersecurity market is continuously expanding as the society rely upon the development and utilization of information technology systems. Within recent years, there has been an increase in the number security risks and data breaches.…

    • 240 Words
    • 1 Pages
    Improved Essays
  • Great Essays

    Leonie Chapman Case

    • 2232 Words
    • 9 Pages

    Risks are identified through consultation with key business resources. (b) Step 2 – Identification of risks – likelihood and impact assessment The likelihood and impact of the risk is assessed from a stakeholder (primarily client) perspective. (c) Step 3 – Identification of risks – treat risk based on assessment The results of step 2 enable appropriate risk management strategies to be developed and prioritised.…

    • 2232 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    In this risk management plan, we will use risk identification to identify the positive and negative risks that are associated with the project. The report will also include a Risk Breakdown structure and a scope statement to further help in understanding the scope this project will be. We will also complete qualitative risk analysis and risk response planning. Scope Statement…

    • 1584 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    Macville Case Analysis

    • 1148 Words
    • 5 Pages

    Risk Management Every organization has pre-defined goals and objectives that give direction to the organization with respect to the market it operates in and its competitors. These objectives are reviewed periodically. For an organization to be successful it is very important to do internal and external analysis in order to identify the possible risks. Identifying the context for risk management helps to understand the objectives; stakeholders involved in the business and define the criteria for the assessment of various risks (Dionne, 2013).…

    • 1148 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Additionally, deliberate and comprehensive risk management makes the economy, resources, the nation, and way of life more flexible through anticipating, corresponding, and preparing for both external and internal hazards. The significance of a risk management strategy is in the capability to differentiate between diverse choices in larger context rather than in the endorsement of a particular action response. Risk management is vital for the leaders of homeland security in prioritizing contending requirements and permitting comprehensive approaches to determine performance and specify…

    • 1169 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Risk Management Benefits

    • 1288 Words
    • 5 Pages

    Benefits of Risk Management Risk management is a vital part of homeland security. It is used to determine the true credibility of a threat against the United States. It helps assist administration in determining what damage could be done to people or assets and also help create a plan which would be used to mitigate damage should a threat be carried out (Raymond, 2002). Risk management is all about prioritizing threats according to how credible they are also what kind of damage they may do. Risk management is a complicated process requiring a vast amount of understanding before being able to critique threats successfully.…

    • 1288 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    A Risk Assessment Plan plays a big role in any company, whether it is big or small company. The risk assessment will help identify the vulnerabilities and threats to the Wells Fargo IT resources. Which will help determine the impact of those vulnerabilities, threats, and unauthorized access. Having some knowledge of what type of risks expect will help mitigate them faster. There are a several steps needed for a good risk assessment plan, which will essentially help the company be in compliance with FISMA and other federal laws.…

    • 720 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Identifying and managing risks is a critical responsibility of project managers. Risk is defined as the probability of a specified threat and the subsequent impact that the event produces (Vaidyanathan, 2013). Risks can also bring about either positive or negative outcomes for a project or organization. A project manager must identify potential risks and evaluate each one to determine the severity and likelihood of each event. Only by completing the risk management process, a project manager can determine what approach would work best to avoid, mitigate, and/or transfer the risk.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    General Liability Policy

    • 846 Words
    • 4 Pages

    Information on each risk is given to the risk manager and validated by the risk analyst. Potential sources that introduce risks are: A) characteristics of the client B) nature of the project C) use of consultants D) method of project delivery E) types of contracts, etc. Analyze Risks - encompasses the evaluation of probability, outcome, impact, severity, and prioritization. Some problems might happen infrequently but have a severe impact on the project and vice verse.…

    • 846 Words
    • 4 Pages
    Improved Essays