risk controlling in ism

10

Click here to load reader

Upload: daniyal-khan

Post on 22-Jan-2018

9 views

Category:

Internet


1 download

TRANSCRIPT

Page 1: Risk Controlling in ISM

In the Name of ALLAH,

the Most Beneficent the Most Merciful

Page 2: Risk Controlling in ISM

Topic:

Risk & Risk Controlling

Presented By:

Daniyal Khan (0047)

Information Security Management

Page 3: Risk Controlling in ISM

A situation involving exposure of danger or uncertainty of profit/loss is called Risk.

Risk

Page 4: Risk Controlling in ISM

There are four types of risk control.

1) Accept Risk

2) Mitigate Risk

3) Eliminate Risk

4) Transfer Risk

Types of risk control

Page 5: Risk Controlling in ISM

The stakeholders who are responsible for a risk can choose to accept a risk. For example, the risk that a project may fail may be accepted if

the project is of planned importance.

Risk management may include an approval process for risk acceptance.

Accept Risk

Page 6: Risk Controlling in ISM

Actions are taken to reduce risk to an acceptable level. For example, the

organization assigns a top performing project management team to a project to

reduce the risk that it will fail.

Mitigate Risk

Page 7: Risk Controlling in ISM

When you mitigate risks it's important to consider secondary risks. Secondary risks are

the risks that are caused by your risk mitigation efforts.

If you reduce a security risk by applying an update to software there's a risk that the update itself contains security vulnerabilities. In some cases, mitigation activities are higher risk than

the risk they reduce.

Secondary Risk

Page 8: Risk Controlling in ISM

A risk may be reduced to zero. Normally the only way to achieve this is to stop the

activity that generates the risk. For example, selling a risky investment will eliminate the risks associated with that

investment.

Eliminate Risk

Page 9: Risk Controlling in ISM

A risk may be transferred to another organization or individual. For

example, fire insurance transfers the risk of asset damage due to fire.

Transfer Risk

Page 10: Risk Controlling in ISM