CYB_410_6-2_ProjectOne_Branden_Knight

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

410

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by MateTurtleMaster4095

Report
1 6-2 Project One Submission: Risk Management Planning Debrief Branden Knight CYB-410: Security Risk Management Southern New Hampshire University 6-2 Project One Submission: Risk Management Planning Debrief
2 Risk Register Risk register as a decision aid can identify risk and use strategic approaches, by determining the high-risk activities, and re-evaluating the risk. While in the process of identifying risk, risk registers’ main purpose is to collect data on identified hazards and threats, their existence or extent of business impact, and to establish specific measures when necessary. Risk may be identified by different methods by strategizing in the executive suite directly through until a small risk analysis is done. As determining the high-risk activities, if there is risk identified in the process, it will be assessed for the possibility of an event, and its connection of the occurrence. Also, it is used to make a distinct determination with high-risk and prioritize responses (Everitt, 2022). It will guarantee that the appropriate steps are taken into consideration by identifying and controlling the threat when it arises. In an organization, the risk register investigates and identifies certain behavioral trends or problems environmentally. I know that risk registers can transmit threats that are identified as input model and produce a computable assessment of security threats, mainly cybersecurity. When managing a simplified risk assessment, it is necessary to search for an outside company per say to help evaluate the external threat landscape. Business Impact Analysis Business Impact Analysis mainly portrays the results of improving the company’s operation and process. It does collect the information that is required to help establish a backup plan. It will be required to use BIA due to the reason that it can timely recognize the details of the organization. 6-2 Project One Submission: Risk Management Planning Debrief
3 The BIA will use accident recovery to make a determination of the function in the organization and will manage the overall impact of the service disruption. Business Impact Analysis has sufficiently implemented numerous plans to ensure that the organizations can provide its services and operate more effectively. Risk Management Planning As security risk management is practiced with efficiency, the strategic value can guarantee that the delivery of the initial plan will be compatible with the company’s goals along with analyzing the risk that will potentially ruin the organization entirely. In general, by having an adversarial mindset, I know it will increase network security by implementing various policies. The reason for various policies is so that the terms and agreements can stay up to date. This will investigate the violation of the security and provide great safeguards. The CIA will ensure that any unauthorized users will not have access to valuable details. It can use different data encryption methods to help keep confidentiality with the security risk factors. Integrity will involve maintaining its consistency and accuracy of the data. These measures include file permissions and user access controls (Fasulo, 2021). Version controls may be used to prevent erroneous changes or accidental deletion by authorized users from becoming a problem. Availability will contain information that should be consistently and readily accessible for the authorized parties only. Providing adequate communication bandwidth and preventing occurrence of bottlenecks are equally important tactics. 6-2 Project One Submission: Risk Management Planning Debrief
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 References Everitt, J. (2022). What Is a Risk Register in Project Management? What is a Risk Register? https://www.wrike.com/blog/what-is-a-risk-register-project-management/ Fasulo, P. (2021). What is the CIA Triad? Definition, Importance, & Examples. What is the CIA Triad? https://securityscorecard.com/blog/what-is-the-cia-triad/ 6-2 Project One Submission: Risk Management Planning Debrief