TAILIEUCHUNG - Risk Management The Big Picture – Part VI

Now that we know the tools and the primary concepts, this part of the course is designed to help you pull everything together. This section is especially important if you need to present security proposals to management. Your next slide, titled Risk Management – Where do I Start presents the roadmap we showed you almost at the beginning of the course. We will bet you have a much clearer idea of how to analyze risks and establish a security infrastructure at this point. Let’s go take a look at the roadmap!. | Risk Management The Big Picture - Part VI Risk Assessment and Auditing Information Risk Management - SANS 2001 1 Now that we know the tools and the primary concepts this part of the course is designed to help you pull everything together. This section is especially important if you need to present security proposals to management. Your next slide titled Risk Management - Where do I Start presents the roadmap we showed you almost at the beginning of the course. We will bet you have a much clearer idea of how to analyze risks and establish a security infrastructure at this point. Let s go take a look at the roadmap 6 - 1 Risk Management - Where do I Start Write the security policy with business input Analyze risks or identify industry practice for due care analyze vulnerabilities Set up a security infrastructure Design controls write standards for each technology Decide what resources are available prioritize countermeasures and implement top priority countermeasures you can afford Conduct periodic reviews and possibly tests Implement intrusion detection and incident response Information Risk Manage ment - SANS 2001 2 This slide is the result of a long international flight. Several top experts in information security were on the plane and this is the roadmap they developed. So far in the entire course we haven t read a slide to you so please relax and listen Write the security policy with business input Analyze risks or identify industry practice for due care analyze vulnerabilities Set up a security infrastructure Design controls write standards for each technology Decide what resources are available prioritize countermeasures and implement top priority countermeasures you can afford Conduct periodic reviews and possibly tests Implement intrusion detection and incident response Students that complete Security Essentials certification are well on their way to accomplishing each of these tasks you will learn how to do policy and about the tools you can use for .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.