Information Security Risk Analysis

Improved Essays
Everyday there are billions of conversations, billions of bytes of data being shared, billions of new files being created, and billions of computer processes running simultaneously. In between all those interactions exists the possibility of theft, fraud and espionage, all of which could be impossible to detect. While there are ways to prevent all possibilities of security breaches, none of those options are viable for organizations which rely heavily on being connected to various networks and having data continuously transferred throughout cyberspace. Instead, organizations focus on creating security systems that identify and contain breaches, still allowing for connectivity to the web. However, regardless of the complexity of a security …show more content…
In Humphreys’s (2010) “Information Security Risk Management,” he claims that for a risk assessment to be meaningful to an organization, the “security risks must be considered in a business context, and the interrelationships with other business functions… need to be identified” (p. 1). Incorporating all the facets of the organization into the assessment, in context specific to the organization’s purpose and goals, demonstrations the crucial need for security based on their administrative needs. This initial assessment is also the basis of the security plan, aligning it to organizational processes to prevent any disruptions of business tasks. A seamless union of security management and standard business practice instills motivation within the organization to concentration more on the security plan, driving a successful risk management process. By understanding the internal structure of the organization, risks can be properly identified and explained to the organization, allowing for a more specific, streamlined development for an organization’s risk analysis and management …show more content…
In the current methods of developing a security plan, there is a lot of preparation when building up to a capable plan. All the work done from risk identification to risk analysis. Most of the steps taken while creating a security plan require an almost parallel development to the organization’s mission statement and goals, which is a task a computer still is unable to perform successfully. Instead, organizations should focus on allotting the proper amount of resources for the security team to complete and manage their security plan, so that the security team does not have to try to work around a budget or try to find the least-costly methods to analyze the organization’s security

Related Documents

  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The aim of this paper is to outline the dynamics of Walters Security. Walters Security’s main objective is to ensure a high level of network and information security for reach client. Customer and client information, payment information, personal files, bank account details- all this information cannot be fully restored once it has been lost or breached by criminals. The goal of this firm is developing an interdisciplinary research platform to develop a framework and provide benefits to eliminate breach-related vulnerability of information.…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    First, it is important to understand that through the application of some of the NIST security control mechanisms, the threat in the case can be substantially minimized. Some of the main approaches and methods that may be used towards minimizing the threat described include enhanced security awareness and training of the users of the system, access control into the system under consideration, frequent system maintenance and upgrades, occasional audits into the system, protection of the system from non-secured program codes, application of intrusion detection systems to detect any form of intrusions into the system and the protection of the system from spywares and spam. 14.5 The first and perhaps the most important value of the threat is that…

    • 252 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    “Threat assessments are important decision support tools that can assist organizations in…

    • 626 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    PCI Compliance Paper

    • 555 Words
    • 3 Pages

    PCI compliance was first introduced in 1999 by Visa, Inc., in the form of the Cardholder Information Security Program (CISP). CISP was developed as Visa’s way to fight rampant cybercrime, which left credit card companies responsible for fraudulent purchases. (Search Security Staff, 2013) However, companies accepting credit transactions did not adopt the standards provided by CISP because they were quite different from the standards presented by other card companies like Discover, MasterCard, and American Express. In December 2004, the five major credit card lenders joined together to create a uniform set of standards called the Payment Card Industry Data Security Standard (PCI DSS).…

    • 555 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Security Scenarios

    • 492 Words
    • 2 Pages

    To support of this security posture the security team will integrate itself into the currently established security infrastructure by participating in command security team meetings and reporting directly to the Command Security Director (CSD) and appointed security investigators any security incidents or events that may occur. Additionally our security team will assist the CSD and Security Investigators queries regarding security concerns by providing requisite documentation and statements as necessary. Our security team will additionally support command operations by establishing direct communications with key personnel both within and external to the command to directly address security questions and concerns. Our security specialists will additionally develop a comprehensive set of procedures for establishing and maintaining accounts for SIPR and Joint Worldwide Intelligence Communications (JWICs) networks for command employees. These procedures will be documented in Standard Operating Procedures (SOP) which will be developed, maintained and regularly reviewed by our security team to ensure that it remains complete and relevant to command operations and will be published to the CSD, Security and resident staff as updates are integrated to ensure that they are cognizant of latest security processes, procedures, and documentation…

    • 492 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Zunis Investments

    • 1339 Words
    • 6 Pages

    For the purposes of this project, the international investment company in question is Zunis Investments. Zunis is an international investment company headquartered in New York, USA with operations in the North American, European and Asian continent, specifically in countries such as Mexico, USA, UK, Finland, Sweden, France, Japan, China and India. They are doing an IT security upgrade and as part of the interview process for this work, they have asked for a scenario in which the company may be attacked, how to identify the attack and figure out the source as well as how to defend against that attack successfully. First off, before we get to that scenario let us start by stating an accepted definition of what an attack, threat, risk and vulnerability…

    • 1339 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Additionally, deliberate and comprehensive risk management makes the economy, resources, the nation, and way of life more flexible through anticipating, corresponding, and preparing for both external and internal hazards. The significance of a risk management strategy is in the capability to differentiate between diverse choices in larger context rather than in the endorsement of a particular action response. Risk management is vital for the leaders of homeland security in prioritizing contending requirements and permitting comprehensive approaches to determine performance and specify…

    • 1169 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    The United States homeland security environment is complex with competing requirements that must be balanced and managed to ensure the achievement of key national measures. The safety and security of the Nation faces threats by means of hazards and terrorism type attacks, as well as manmade accidents or natural disasters. Though out this ever changing environment homeland security must manage risks that can be associated with workforce management, acquisitions operations, as well as other cost that degrade from the overall budgets that are in-place for department operations. Additionally these external and internal risks have the potential to cause loss of life, impacted environmental conditions, and loss of economic activity, and all are connected to mission essential functions, and could degrade public confidence in government operations.…

    • 1043 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    Security systems both physical and virtual are utilized to safeguard information from being copied, stolen, or destroyed. This is complicated by the fact that cyber-attacks can originate from hundreds of miles away and the source can be complicated to determine (Kemp 2012, p. 33). This leads to more robust security systems and multiple layers of duplicated…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Information Security Policy Compliance: Stick or Carrot Approach? Yan Chen K. Ramamurthy and Kuang-Wei Wen collaborated to write an article titled Organizations’ Information Security Policy Compliance: Stick or Carrot Approach? The article suggests internal security threats are most commonly seen in the forms of insider security breaches or employee negligence. The authors discuss results from research and surveys conducted by external control groups and through their own control groups used to determine what control methodology best motivates employees to follow an organizations security policies.…

    • 744 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    However, with every advancement comes the criminal exploits of vulnerabilities. This criminal element help create the notion of “policing” cyberspace, which enviably lead to the development of new tactics and techniques to secure…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, program and data from attack, damage or unauthorized access. Current threats of the US that are at risk include banking and financial institutions, telecommunications networks, and energy facilities. Although most of these are owned by the private sector, they are extremely crucial to the welfare of the US and are also heavily dependent on computer networks. These networks and information systems are what need protection from potential attackers and intruders. The federal government has taken various steps to protect our country such as: implementing a strategy to address cyber risks to federal building and access to control systems, improving federal efforts to implement cybersecurity in the maritime port environment and enhancing cybersecurity for air traffic control systems.…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays

Related Topics