Question

Risk in the context of security is the possibility of something bad happening, and the results...

Risk in the context of security is the possibility of something bad happening, and the results of the damage if it occurs. Discuss the purpose and benefits of establishing a formal Information Risk Management (IRM) process.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Purpose of a formal Information Risk Management process

1) Identifying
Information risk management helps in identifying the risks to keep the information secure and accurately available.

2) Assessing
Risk assessment helps to identify the hazards and the risk factors which have potential to cause harm and determining appropriate ways to control and eliminate the risk.

3) Prioritize
After assessing probabilities and the consequences of the risk events after they are realized. The results are used to prioritize the risk to establish the most-to-least-critical significance ranking.

Benefits

1) To Analyze Threat
Threat is inherent in the information risk management and many organization assume that the vendors offer some level of threat.

2) To understand the value of information
It is important to understand the value of information as consequence depends largely on it. In Determining consequence side of the risk, organization needs to ask what may happen if the particular piece of data is compromised

3) Vulnerability

Vulnerability is the quality of being exposed to possibility of getting harmed. In information risk assessment their are chances of getting harm while taking the risk.



Add a comment
Know the answer?
Add Answer to:
Risk in the context of security is the possibility of something bad happening, and the results...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control...

    Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control assessor Information System Owner (ISO) Information Owner/Steward When making determinations regarding the adequacy of common controls for their respective systems, Information System Owner (ISO) refer to the Common Control Providers’ (CCP) Privacy Impact Assessment (PIA) Business Impact Analysis (BIA) Authorization Packages Vulnerability Scans An organization-wide approach to identifying common controls early in the Risk Management Framework (RMF) process does which of the following? Considers...

  • Chapter 6: Risk Management( Principle of information security 5th edition)-Ethical decision making Suppose Amy Windahl left...

    Chapter 6: Risk Management( Principle of information security 5th edition)-Ethical decision making Suppose Amy Windahl left the kickoff meeting with a list of over 200 assets that needed to be evaluated. When she looked at the amount of effort needed to finish assessing the asset values and their risk evaluations, she decided to “fudge” the numbers so that she could attend a concert and then spend the weekend with her friends. In the hour just before the meeting in which...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Who cares about personal integrity in business ethics? It has become something of an institution for...

    Who cares about personal integrity in business ethics? It has become something of an institution for you to go out drinking with friends on Friday night. However, on this particular Friday night, you not feeling so great. Yes, you are holding an expensive cocktail in your hand, with some of your best mates around, all very much up for a big night out. Your best friend from college, Peter, will be arriving any minute now. You are a regional marketing...

  • Examining the Importance of Data Governance in Healthcare By Shannon Fuller, MBA HEALTHCARE HAS ALWAYS focused...

    Examining the Importance of Data Governance in Healthcare By Shannon Fuller, MBA HEALTHCARE HAS ALWAYS focused on managing information from application to application, instead of looking at information holistically and defining it holistically. The industry's shift of focus onto analytics—whether it's for predictive analytics or modeling for improved readmission rates—puts the focus back on foundational data. Ihat's what is needed for things like population health, which is increasingly important in healthcare. Patient data isn't held or uséd solely in electronic...

  • Identifying flaws in contingency plan Objectives: Research real world incidents, identify shortc...

    Identifying flaws in contingency plan Objectives: Research real world incidents, identify shortcoming (IR, BP or CP) and recommend possible solutions. Course Learning Outcomes: CL05, CL01: Student will be able to understand, implement and bring recommendations to contingency plan Tools or Equipment Needed: PC Internet explorer or chrome Internet Theoretical Background: A contingency plan is a course of action designed to help an organization respond effectively to a significant future event or situation that may or may not happen. A contingency...

  • Read the article bellow an answer the question at the bottom. Broadcom Completes Acquisition of Symantec...

    Read the article bellow an answer the question at the bottom. Broadcom Completes Acquisition of Symantec Enterprise Security Business November 4, 2019 SAN JOSE, Calif., Nov. 4, 2019 /PRNewswire/ -- Broadcom Inc. (NASDAQ: AVGO), a global technology leader that designs, develops and supplies semiconductor and infrastructure software solutions, today announced that it has completed its acquisition of the Enterprise Security business of Symantec Corporation (NASDAQ: SYMC). Symantec's Enterprise Security business will now operate as the Symantec Enterprise division of Broadcom...

  • Title: Partners Health Care Systems (PHS): Transforming Health Care Services Delivery through Information Management According to...

    Title: Partners Health Care Systems (PHS): Transforming Health Care Services Delivery through Information Management According to government sources, U.S. expenditures on health care in 2009 reached nearly $2.4 trillion dollars ($2.7 trillion by the end of 2010).[1] Despite this vaunting national level of expenditure on medical treatment, death rates due to preventable errors in the delivery of health services rose to approximately 98,000 deaths in 2009.[2] To address the dual challenges of cost control and quality improvement, some have argued...

  • Part I— Just Bad Luck? Brrrring! Brrrring! Jane checked the caller ID on her phone. “Sam!...

    Part I— Just Bad Luck? Brrrring! Brrrring! Jane checked the caller ID on her phone. “Sam! Great!” she thought. It was always nice to get a call from her older brother. But a little twinge of worry tugged at her. It was just a couple of weeks ago that he had mentioned making an appointment with his doctor about some abdominal pain he had been having. “Hi Sam! It’s great to hear from you,” Jane answered. “Hi Jane. Well I...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
Active Questions
ADVERTISEMENT