Monday, May 13, 2019
Information Security Risk Management Case Study Example | Topics and Well Written Essays - 500 words
Information Security guess Management - Case Study ExampleOrganization face internal as well as external actor, which create uncertainty for organizations in achieving the objectives. Hall (2010) called that the take chances management was a hybrid blend that had bridged the number of disciplines to reduce or avoid loss for organizations. Proactive activities are attempted to mitigate or prevent loss in the organizations.Tavakkoli-Moghaddam et al., (2011) used the compromise ranking (VIKOR) and fuzzy entropy techniques in engineering, procurement and construction projects. Separate techniques for risk identification and risk prioritization are used. Qualitative assessment helps the management to rank the risks identified by calculating their impacts and impacts. Except these techniques, Monte Carlo method is most significantly used for risk identification. This method is based on probability and their impacts. Monte Carlo method shows the correlation between the identified vari ables for a project.Identification of vulnerabilities and threats through risk assessment helps in determining the impacts of each risk. However, risk assessment becomes a complex undertaking when imperfect information is provided. Value assignment to information system business processes including the costs, recovery and their impacts can be measured in indirect and direct costs.Exposure of sensitive information closely a specific business area of the organization has wide consequences and impacts the reputation or regard of the organization. attacker can falsify the information, which is important for future decisions. Both qualitative and quantitative risk assessment technique can be used (Carroll, 2009).Risk identification requires the risk treatment. Risk treatment is a come out of options used for risk evaluation and plan preparation for risk treatment. Planning the risk treatment as well requires plans implementation. In an organization, when risk about information secur ity
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.