A proactive approach is much more advantageous however as it enables corporations to prevent threats or minimize risks before negative occurrences happen within an organization. A proactive approach requires that organizations first identify what assets they have that need protecting, then determine what damage an attack could have on assets in question, next identify any vulnerabilities that could occur within current securities and finally decide on procedures to minimize the risk of threats and attacks by implementing proper risk management controls and procedures (Microsoft, 2004). In this sense risk management is much like risk "assessment' which allows organization to place value on assets and determine the benefits of protecting such assets (Microsoft, 2004).
Kimball (2000) supports such measures suggesting that failures in risk management result when organizations fail to properly assess their assets and define potential current and future risks. Like the Microsoft model Kimball (2000) suggest that mathematical probability and cost benefit analysis can be used to determine what parameters are necessary to minimize risk and what losses a company may realize if certain risks aren't mitigated. The researcher suggests additional measures be implemented to reduce risk including "purchasing insurance, hedging, screening customers, closely supervising employees and monitoring supervisors and diversification" (Kimball, 3). It is important to note the researcher does not suggest that risk may be completely eliminated, but rather that organizations can drastically reduce the probability that something catastrophic ill occur as a result of threats against the company.
Kimball suggests that many other factors can be utilized to evaluate and manage risk. Aspects of a firms operations including managers ability to diversify portfolios, the proportion of "intangible assets" an organization have and the "convexity of tax schedules" among all influence risk and thus must be evaluated (Kimball, 3).
Leithhead & McNamee (2000) identify multiple approaches to risk management, including the database approach, the algorithm approach and the matrix approach. The database approach concerns itself with developing a database that extracts reports delineating common risks within a group (Leithhead & McNamee, 200). Such an approach might also be referred to as a scenario driven approach to risk management, and may help managers review data for financial risks or risks associated with specific asset groups.
The algorithm approach involves mathematical calculations to asses risk management (Leithhead & McNamee, 2000). This approach is sued by the Microsoft security risk management system. Risk model using this approach include database gathering of information as well as strategic-based planning (Leithhead & McNamee, 2000). Mangers can manipulate data more using this approach than the database approach alone. The matrix approach involves "higher level focus and graphic display of risk" where an organization's business units are compared with high-level risks on two axis. Teams then asses risk and display risk on a matrix (Leithhead & McNamee, 2000).
Risk Management Failure Reduction
Failure occurs when organizations realize catastrophic losses that exceed worse case expectations, when errors occur in risk management or when firms simply fail to plan for risk management as part of operations (Kimball, 2000).
Microsoft (2004) suggests that failure may occur when an organization leaves out vital portions of the risk management process, which may include engaging in qualitative and quantitative analysis of risk measurement. Quantitative risk assessment includes evaluating and assigning monetary significance to define assets, creating a list of medium to high risk threats, calculating the probability these threats will occur and how long they will last, determining the loss potential for an organization over a 12-month period and recommending appropriate cost reasonable safeguards and controls to mitigate risks (Microsoft, 2004).
While most of these calculations would be subjective at best they nonetheless will provide an organization with valuable information related to risk management. Organizations can't exactly define risks or the potential losses that will result from a threat; they can however take steps to reasonable assume the potential risk or threat of a given situation and calculate the cost to benefit ratio of mitigating this risk.
Qualitative assessment is unlike quantitative assessment in that it involves much more subjectivity and experience related information. It does not involve assignment of monetary values to losses and assets, but rather involves risk evaluations through questionnaire and workshops that share knowledge between different people (Microsoft, 2004).
Researchers have also defined this as 'scenario driven' risk management and planning (Acar & Georgantzas, 1995). Strategic management according to Acar & Georgantzas (1996) involves detecting and planning for threats and converting them into opportunities. They call this process scenario driven planning and can help an organization improve the "content and process or what and how of strategy...
One of the major reasons for this vulnerability is the increased and widespread presence of these groups within the American home soil. As a result of the various operations in about 40 states in America, the sleeper cells are carefully planning and waiting for their next attacks. The second major reason for America's vulnerability to operations of sleeper cells is that the country's first-line defenders are neither adequately trained
S. Department of Energy). Q3. Discuss the internet of things and its likely consequences for developing an enforceable information assurance (IA) policy and implementing robust security architecture. The internet of things refers to the inevitable connectedness of all things in all regions of the world through the internet. "The fact that there will be a global system of interconnected computer networks, sensors, actuators, and devices all using the internet protocol holds so
Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields
Security Audit for FX Hospital EHR/EMR Systems The study carries out the security audits for the FX Hospital EHR/EMR information systems to identify the vulnerabilities in the systems. The study uses the BackTrack as an auditing tool to penetrate the website, and outcomes of the auditing reveal that the website is not secure and can be subject to different vulnerabilities. After carrying out the auditing, the study is able to collect
Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,
Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now