MGMT 755 Security Risk Analysis

7
Dr. Benjamin Khoo [email protected] New York Institute of New York Institute of Technology Technology School of Management School of Management

description

New York Institute of Technology School of Management. MGMT 755 Security Risk Analysis. Dr. Benjamin Khoo [email protected]. Chapter 1: (Introduction – FAQ). Why should a Risk Assessment be conducted? When should a Risk Analysis be conducted? - PowerPoint PPT Presentation

Transcript of MGMT 755 Security Risk Analysis

Page 1: MGMT 755 Security Risk Analysis

Dr. Benjamin [email protected]

New York Institute of TechnologyNew York Institute of TechnologySchool of ManagementSchool of Management

Page 2: MGMT 755 Security Risk Analysis

1. Why should a Risk Assessment be conducted?2. When should a Risk Analysis be conducted?3. Who should conduct the Risk Analysis and

Risk Assessment?4. Who within the organization should conduct

the Risk Analysis and Risk Assessment?5. How long should a Risk Analysis or Risk

Assessment take?6. What can a Risk Analysis or Risk Assessment

Analyze?

Page 3: MGMT 755 Security Risk Analysis

7. What can the results of Risk Management tell an Organization?

8. Who should review the results of a Risk Analysis?

9. How is the success of the Risk Analysis measured?

Page 4: MGMT 755 Security Risk Analysis

1. Overview- RM used to balance operational & economic costs of protective measures (IS)

and achieve gains in mission capability.- made up of:

1. risk analysis2. risk assessment3. risk mitigation4. vulnerability assessment & controls

evaluation.

See Table 2.1 for definitions.

Page 5: MGMT 755 Security Risk Analysis

2. Risk Assessment as part of the business process

See Figure 2.1

Risk Management Activities mapped to the SDLC

See Table 2.2

Page 6: MGMT 755 Security Risk Analysis

3. Employee Roles and Responsibilities

See Table 2.3, Table 2.4 & Table 2.5 for examples.

4. Information Security Life Cycle

See Figure 2.2

5. Risk Analysis Process

Page 7: MGMT 755 Security Risk Analysis

6. Risk Assessment1. Asset Definition2. Threat Identification (See Table 2.6)3. Determine Probability of Occurrence4. Determine the Impact of the Threat

(See Figure 2.3 and Figure 2.4)5. Controls Recommended6. Documentation