Question

In: Operations Management

Risks should be monitored after risks have been identified and mitigations have been implemented to reduce...

Risks should be monitored after risks have been identified and mitigations have been implemented to reduce the likelihood of exploit. Identify and explain risk monitoring methods that should be used to ensure the identified risks and risk mitigation's remain at an acceptable level.

Solutions

Expert Solution

The first thing important in risk management is to assess the risk itself, what is the extent of the risk posed to the organization. System characterization, threat identification, vulnerability identification, control analysis, likelihood determination, impact analysis, risk determination, controls recommendations, and results documentation (NIST Special Publication 800-30, 2017). System characterization is essentially locating and determining the equipment at risk. Threat detection will provide the weaknesses within the IT system. Vulnerability identification will provide a list of system flaws. Control analysis provides a plan for minimizing or elimination of the threat. Along with likelihood, impact and the other methods listed above will help monitor and minimize risk.

The terms threat, risk, and vulnerability are sometimes used interchangeability. However, these terms have distinct meanings and must be used properly when conducting risk assessments and protecting systems from Internet threats. Define and compare the terms threat, risk, and vulnerability.

Threat – These can exploit a vulnerability that can be intentionally or accidentally

Risk – Once the threat has been exploited the damage done

Vulnerability – These are weaknesses within the security program that are exploited

While each of these terms are interchangeable they are not equal, or can they work alone. Once there is a weakness, such as outdated firmware, that firmware can be exploited then there is the potential for loss. Threats can include many aspects like spyware or malware while a vulnerability finding a way in through the design of the system or the software installed on the systems.


Related Solutions

After a Strategic Plan has been developed, approved and implemented, it's progress should be monitored, reviewed...
After a Strategic Plan has been developed, approved and implemented, it's progress should be monitored, reviewed and evaluated to determine if the specific strategic objectives are being met. Describe, in detail, the process of developing a Strategic Plan Review Process for an existing strategic plan a company may already have in place. In your discussion be sure to identify and discuss some of the quantitative business metrics and qualitative standards or benchmarks that might be evaluated. Provide an example of...
Evaluation: Three hours after admission… All orders have been implemented and consults have been called. Ben’s...
Evaluation: Three hours after admission… All orders have been implemented and consults have been called. Ben’s mother arrives at the hospital. Pamela is slurring her speech, and her eyes appear glazed. Pamela admits to the nurse that she stopped and had a single glass of wine prior to coming to the hospital. Ben becomes agitated and inconsolable when his mother attempts to pick him up. The nurse calls hospital security and a cab is called for Pamela. Current VS: Most...
Some DRM systems have been implemented on open systems and some have been implemented in closed...
Some DRM systems have been implemented on open systems and some have been implemented in closed systems. a. What is the primary advantage of implementing DRM on a closed system? b. What is the primary advantage to implementing DRM on an open platform?
Perform research on cybercrime risks. Identify some typical cybercrime risks that you have identified based on...
Perform research on cybercrime risks. Identify some typical cybercrime risks that you have identified based on your internet research. Based on the information identified summarize your overall findings. Identify how the cybercrime risks that you researched could have been remediated by the company in which they were involved in. 200 words or more, please.
Adequate controls have to be implemented if an organization wants to reduce errors and fraud when...
Adequate controls have to be implemented if an organization wants to reduce errors and fraud when using computer technology. It is in the design stage of an information system that the appropriate controls are planned to ensure reliability of data. A good design can prevent both intentional and unintentional alteration and destruction of data. The data controls can be classified as input controls, process controls, and output controls. For each of these control categories, provide two specific controls, and state...
Identify three conditions that would need to be implemented (or have already been implemented) in your...
Identify three conditions that would need to be implemented (or have already been implemented) in your organization to create a culture of innovation and change.
Identify three conditions that would need to be implemented (or have already been implemented) in your...
Identify three conditions that would need to be implemented (or have already been implemented) in your organization to create a culture of innovation and change.
A risk management program must be implemented and periodically monitored to be effective. This step requires...
A risk management program must be implemented and periodically monitored to be effective. This step requires the preparation of a risk management policy statement. The cooperation of other departments is also necessary. 1) What benefits can the firm expect to receive from a well-prepared risk management policy statement? 2) Identify several departments within a firm that are especially important in a risk management program.
a. Give an example from your professional experience where you have identified and implemented an improvement...
a. Give an example from your professional experience where you have identified and implemented an improvement in the work processes/activities. b. Explain how you would communicate the savings and productivity/service improvements achievements to the relevant personnel within or outside the organisation
The < and == operators for the class Record have already been implemented for you.
The < and == operators for the class Record have already been implemented for you. Write the code necessary to complete the >, <=,>= and != operators. (hint: you do not need to know anything about the Record class to complete)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT