TAILIEUCHUNG - Risk Management Guide for Information Technology Systems phần 2

Ví dụ, tổ chức có thể không muốn chi tiêu $ 1,000 trên một điều khiển để làm giảm nguy cơ 200 $. Một phân tích chi phí-lợi ích cho các điều khiển mới được đề xuất hoặc tăng cường kiểm soát bao gồm những điều sau đây: Xác định tác động của việc thực hiện các điều khiển | of each SDLC phase and indicates how risk management can be performed in support of each phase. Table 2-1 Integration of Risk Management into the SDLC SDLC Phases Phase Characteristics Support from Risk Management Activities Phase 1 Initiation The need for an IT system is expressed and the purpose and scope of the IT system is documented Identified risks are used to support the development of the system requirements including security requirements and a security concept of operations strategy Phase 2 Development or Acquisition The IT system is designed purchased programmed developed or otherwise constructed The risks identified during this phase can be used to support the security analyses of the IT system that may lead to architecture and design tradeoffs during system development Phase 3 Implementation The system security features should be configured enabled tested and verified The risk management process supports the assessment of the system implementation against its requirements and within its modeled operational environment. Decisions regarding risks identified must be made prior to system operation Phase 4 Operation or Maintenance The system performs its functions. Typically the system is being modified on an ongoing basis through the addition of hardware and software and by changes to organizational processes policies and procedures Risk management activities are performed for periodic system reauthorization or reaccreditation or whenever major changes are made to an IT system in its operational production environment . new system interfaces Phase 5 Disposal This phase may involve the disposition of information hardware and software. Activities may include moving archiving discarding or destroying information and sanitizing the hardware and software Risk management activities are performed for system components that will be disposed of or replaced to ensure that the hardware and software are properly disposed of that residual data is appropriately .

Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.