Risk Management

Curs
7.3/10 (3 voturi)
Domeniu: Engleză
Conține 1 fișier: pdf
Pagini : 10 în total
Cuvinte : 5153
Mărime: 30.82KB (arhivat)
Publicat de: Dragomir Văduva
Puncte necesare: 0
Profesor îndrumător / Prezentat Profesorului: James W Meritt

Extras din curs

To believe the news media, there are a host of cruel and omnipotent hackers out there who can totally

destroy any system they set their minds to, spreading total devastation upon whoever and wherever they wish. The

slightest freak of nature - heavy rain, a fire, a date on a calendar - can wipe any system out entirely. This is not the

case: the devastation is not total, the destruction is not complete there are countermeasures which can be brought to

bear to avoid this disastrous outcome.

Introduction

There are a number of very real risks to information systems, but they are not absolute. There is a chance of

any system being subject to attack, but it isn’t certain. You are not subject to the whims of the attacker or of nature,

there are many things which can be done to mitigate the losses.

Risk management is the total process of identifying, measuring, and minimizing uncertain events affecting

resources. This paper was written to help in the objective analysis of the risk management process.

Evaluating What Is At Risk

Every asset has an associated cost. The cost of physical assets should be the at least the replacement cost, which

should also include inflation rates. Categories that should be considered are:

Facilities: All buildings, air conditioning, furnishings and other support equipment. Excludes any asset

more properly classifiable in another asset category. Think of things like "fire" or "flood". Other

possibilities include earthquake, bombs and chemical contamination which causes the EPA to close the

facility. The cost associated with computing resources can be the cost to run the resource for a given time

period, or by estimating the time required to rebuild/compile, test and re-install.

Equipment: All information system equipment located in the contiguous area. Does NOT include

equipment that would NOT be lost, say, in a fire that completely destroys the computer facility such as

relay equipment under a manhole cover or mounted on a telephone pole outside of the facility. Everything

that you had to buy and install in the center- you should be able to get the purchase price real easy. And

check the maintenance agreement - there may be some proviso in there amongst the warranty information.

Software: All programs and documentation that would be lost if the computer facility was completely

destroyed. This can be broken down into:

Commercial - You bought it, you can consult your receipt. Check the warranty

information, because it may be replaced for free in the event of disaster.

Proprietary - You developed it yourself. How much would it cost to re-create it?

Records and Files: All magnetic media data files that would be lost if the facility were completely

destroyed. Simply count and multiply. The information content of those items is covered next.

Data and Information: An arbitrary value methodically applied to represent the value of all data and

information maintained in the computer facility; including any losses that might occur were the data

compromised but not necessarily destroyed.

For estimating the costs of the data itself, talk to the information owners: find out how much time

and resources would be required to replace it (if they need to replace it all). Cost time and resources - the

procurement department should be able to cost staff time when needed. One measure is the labor needed to

recreate it. To this should be added the "opportunity cost" -- the money unearned because one is busy

recreating instead of proceeding with other business. Try to estimate impact on the business: ask questions

such as: "can you do your work without this data? If not, can the company operate without revenue until

you get the information back?" and so on. Estimate cost of this impact (taking into account intangibles such

as loss of business, loss of reputation, etc.). Internal/external auditors should be able to help do the cost

estimating.

Information results from the processing of data. Although there are ways to quantify and

characterize data, measuring the value of information is more difficult. Often a small amount of

information will have greater value than large amounts of other information. The need to design costeffective

information protection architectures adds new urgency to this classic problem. There is no one

metric that applies to all circumstances, but an approach using multiple metrics, each looking at one aspect

can still be useful. Although it would be nice to have a simple way of assigning an absolute value to

information, it may be more useful to assess value is relative to some context including the uses that are to

be made of it as well as the actions of competitors or enemies.

Preview document

Risk Management - Pagina 1
Risk Management - Pagina 2
Risk Management - Pagina 3
Risk Management - Pagina 4
Risk Management - Pagina 5
Risk Management - Pagina 6
Risk Management - Pagina 7
Risk Management - Pagina 8
Risk Management - Pagina 9
Risk Management - Pagina 10

Conținut arhivă zip

  • Risk Management.pdf

Alții au mai descărcat și

Risk Management - A Science Or An Art

Strategies for identifying and measuring risk can help treasury personnel develop a sound diversification policy Before a risk profile can be...

The Evolution of Computer Science

The Evolution Of Computer Science The birth of computers and information technology goes back many centuries. The development of mathematics led...

11th of September 2001

The day of September 11th 2001 will remain as a dark day in history. All people know about this day and what happened at this date. On this day,...

Test de engleză 3

Part Three: Gapped Text You are going to read a magazine article about a trip to Australia. Seven paragraphs have been removed from the article...

Prezentare a Mediului de Afaceri Argentinian

INTRODUCTION Essential facts about Argentina Geert Hofstede analysis over Argentina and the Latin American countries BUSINESS ETIQUETTE...

Te-ar putea interesa și

Chemical Risk Analysis for Aflatoxin

I. Chemical risk assessment 1. What are aflatoxins? Aflatoxins are toxic metabolites produced by certain fungi in/on foods and feeds. They are...

Banking Risk Management

1. Introduction In this paper we will try to introduce the complex universe of banking risks. Banks play a central role in the economy due to the...

Limitele Asigurabilitatii Riscurilor

INTRODUCERE Reprezentând un domeniu complex, ce îmbină armonios economia, finanţele, dreptul şi matematica, se consideră că asigurările au început...

Managementul riscului. studiu de caz - concert Madonna la București

1 Summary The world of events has evolved to being a very profitable industry that now exists in its own right, independent from tourism,...

Necesitatea și rolul gestiunii riscurilor financiare

Abstract Societatea de astăzi se caracterizează printr-o viteza accelerată a acțiunilor desfășurate, prin schimbări neașteptate și prin apariția...

Risk management plan - Librăria Cărturești

Întrucât organizațiile încep proiecte noi, ele încep să opereze într-o zonă de incertitudine care vine în același timp cu dezvoltarea de produse și...

The use of AI in Banking

Introduction The origins of AI concept In 1956 the term artificial intelligence was born thanks to computer scientist John McCarthy and the...

Risk Management

Fiecare oganizatie are o misiune. Este era digitală, astfel încât organizatiile ar trebui să-si informatizeze sistemele tehnologice pentru a...

Ai nevoie de altceva?