Lec2risk AssessmentA
Lec2risk AssessmentA
Lecture 2
Accessing risk
To retain complete control over your networks and
data, you must take a proactive approach to
security, an approach that starts with assessment to
identify and categorize your risks.
…
◻ Risk assessment can be performed using five steps:
1. Check existing security policies
2. Analyze , prioritize and categorize resources
3. Consider business concerns
4. Evaluate existing security controls
5. Leverage existing management and control
architecture
Security Policy
◻ Security policy is a document that reflects the
overall security concepts, standards, and processes
that form the foundation for every security
measures taken by an organizations.
…
◻ Security policy of an organization should cover the
following:
⬜ Physical security to protect the people, equipment,
facilities and computer assets.
⬜ User ID and rights managements to ensure only
authorized users have access to organization’s network
devices.
⬜ Network Security to protect the network devices.
⬜ System security to deploy the necessary defenses.
…
◻ Authorized security tools and testing required for
particular computer environment.
◻ Auditing procedures to periodically check
security compliance.
Benefits of security policy
◻ Communicates a common vision for security
throughout a company.
◻ Represents a single easy to use source of security
requirement.
◻ Exists as a flexible document that should be
updated at least annually to address new threats.
SECURITY POLICY TEMPLATE-II
A security policy is the essential basis on which an effective and comprehensive security
program can be developed. This critical component is the primary way in which the agency
security plan is translated into specific, measurable, and testable goals and objectives.
The security policies developed must establish a consistent notion of what is and what is not
permitted with respect to control of access to your information resources. They must bond
with the business, technical, legal, and regulatory environment of your agency.
Section 1 – Introduction:
A purpose should be stated in the introduction section. This should provide the reader with a
brief description of what this policy will state and why it is needed. The security stance of
your agency should be stated here.
Section 5 – References:
This section lists all references mentioned in the policy, including agency standards,
procedures, government code, and State Administrative Manual sections.
Security advisory
◻ Software bugs introduced during development produce
security exposures.
◻ To combat these exposures, most manufacturers release