CYB_410_6-2_ProjectOne_Branden_Knight
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
410
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
4
Uploaded by MateTurtleMaster4095
1
6-2 Project One Submission: Risk Management Planning Debrief
Branden Knight
CYB-410: Security Risk Management
Southern New Hampshire University
6-2 Project One Submission: Risk Management Planning Debrief
2
Risk Register
Risk register as a decision aid can identify risk and use strategic approaches, by
determining the high-risk activities, and re-evaluating the risk. While in the process of
identifying risk, risk registers’ main purpose is to collect data on identified hazards and threats,
their existence or extent of business impact, and to establish specific measures when necessary.
Risk may be identified by different methods by strategizing in the executive suite directly
through until a small risk analysis is done. As determining the high-risk activities, if there is risk
identified in the process, it will be assessed for the possibility of an event, and its connection of
the occurrence. Also, it is used to make a distinct determination with high-risk and prioritize
responses (Everitt, 2022). It will guarantee that the appropriate steps are taken into consideration
by identifying and controlling the threat when it arises. In an organization, the risk register
investigates and identifies certain behavioral trends or problems environmentally. I know that
risk registers can transmit threats that are identified as input model and produce a computable
assessment of security threats, mainly cybersecurity. When managing a simplified risk
assessment, it is necessary to search for an outside company per say to help evaluate the external
threat landscape.
Business Impact Analysis
Business Impact Analysis mainly portrays the results of improving the company’s
operation and process. It does collect the information that is required to help establish a backup
plan. It will be required to use BIA due to the reason that it can timely recognize the details of
the organization.
6-2 Project One Submission: Risk Management Planning Debrief
3
The BIA will use accident recovery to make a determination of the function in the
organization and will manage the overall impact of the service disruption.
Business Impact Analysis has sufficiently implemented numerous plans to ensure that the
organizations can provide its services and operate more effectively.
Risk Management Planning
As security risk management is practiced with efficiency, the strategic value can
guarantee that the delivery of the initial plan will be compatible with the company’s goals along
with analyzing the risk that will potentially ruin the organization entirely.
In general, by having an adversarial mindset, I know it will increase network security by
implementing various policies. The reason for various policies is so that the terms and
agreements can stay up to date. This will investigate the violation of the security and provide
great safeguards. The CIA will ensure that any unauthorized users will not have access to
valuable details. It can use different data encryption methods to help keep confidentiality with
the security risk factors. Integrity will involve maintaining its consistency and accuracy of the
data. These measures include file permissions and user access controls (Fasulo, 2021). Version
controls may be used to prevent erroneous changes or accidental deletion by authorized users
from becoming a problem. Availability will contain information that should be consistently and
readily accessible for the authorized parties only. Providing adequate communication bandwidth
and preventing occurrence of bottlenecks are equally important tactics.
6-2 Project One Submission: Risk Management Planning Debrief
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
References
Everitt, J. (2022). What Is a Risk Register in Project Management?
What is a Risk Register?
https://www.wrike.com/blog/what-is-a-risk-register-project-management/
Fasulo, P. (2021). What is the CIA Triad? Definition, Importance, & Examples.
What is the CIA
Triad?
https://securityscorecard.com/blog/what-is-the-cia-triad/
6-2 Project One Submission: Risk Management Planning Debrief