Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Security Risk Management. Business Continuity Management Practice Time: Provide examples of disasters. Create a full list of natural disasters Create a full list of man-made

Security Risk Management. Business Continuity Management

Practice Time: Provide examples of disasters.

Create a full list of natural disasters Create a full list of man-made disasters Categorize listed disasters using classification by nature* Categorize listed disasters using classification by impacted objects*

Disaster Man-made / Natural Nature Impacted object
Heavy Rains Natural Meteorological Infrastructure
War Man-made Social Human resources

Select and describe 5 security risks Select and describe risk assessment scale Declare the acceptable risk level For the selected risk scenarios assess Likelihood = Probability = Rate of Occurrence For the selected risk scenarios assess Severity level = Impact = Criticality rank

Prioritize the selected 5 risks by the assessed Risk level For all selected 5 security risks identify appropriate risk response strategy For the most critical 2 security risks identify suitable mitigations controls Prioritize the listed mitigation activities

Select 1 security related process from the list of the processes located on the next slide Identify all groups of assets and resources business process relies on Identify all individual assets selected business process relies on Select scale for asset evaluation Value each asset Select the limit from which asset is considered to be critical for operations Use Ishikawa fishbone diagram to illustrate results Assign MTD, RTO and RPO corresponding to each asset value Based on assigned recovery time, establish the sequence of recovery

Asset Management Process Access Management Process Employees Onboarding/Offboarding Process Physical Security Management Process Backup and Recovery Process Security Incident Management Process Security Audit Process

Security Awareness and Training Process Vulnerability Management Process Patch Management Process Penetration Testing Process Business Continuity Management Process Security Risk Management Process Security Compliance Management Process Change Management Process

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Databases On The Web Designing And Programming For Network Access

Authors: Patricia Ju

1st Edition

1558515100, 978-1558515109

More Books

Students also viewed these Databases questions

Question

=+(0

Answered: 1 week ago

Question

Explain basic guidelines for effective multicultural communication.

Answered: 1 week ago

Question

Identify communication barriers and describe ways to remove them.

Answered: 1 week ago

Question

Explain the communication process.

Answered: 1 week ago