logo

Understanding Security Risk and Risk Management Plan

2 Pages587 Words318 Views
   

Added on  2019-10-09

About This Document

This article discusses security risk, acceptable and unacceptable risk, risk management plan, treatment option, and more. It also covers the identification and incorporation of risk, management requirements, and confidentiality requirements. Examples of resources, equipment, and materials to assist plan implementation are also provided.

Understanding Security Risk and Risk Management Plan

   Added on 2019-10-09

ShareRelated Documents
1.What is security risk? Can you distinguish acceptable and unacceptable risk?Security risk can be predictable or un predictable so there are experts in the company to judge the risk and take actions against the risk.Some risk can causes failure to the product that will be considers as un acceptable risk Some risk will be there which may not affect the system in to any failure these Risks are Acceptable Risk .2.What is the action plan in terms or risk management?Secure the product or the system with the latest technological possible solutions.Backup the file of the products so that the company will not be affected.Hire experts to regular check and Auditing of the product for any risk. 3.How many types of risk in association with security context? How do you identify and incorporate into planning processes?There are two types of Risk with context which will cover internal and External Risk plans To Identify and incorporate risk first we should know the background information that deald with the risk. Background information is so much important and it can give a path to identify the risk and form a plan for predicting the Risk.4.What is treatment option? Who will research, clarify and approve it?The Treatment option is to find out the steps to perform and modify the risk so that it can be easily understand by all and people will find a way to reduce the the risk. There are organization like enisa who has the Authority to check and prove the treatment plan. 5.In development of security risk management plan, how do you identify management requirements?There are several ways to identify the risk requirements The requirements to be considers are functional requirements and non functional requirements but to find the ways requirements are to be first analyze the situation of the risk,check the record for the same risk and then select the requirement of the risk. 6.Why do you have to present the risk management plan to your client?We should produce a risk management plan because if some thing in the operation floor goes wrong these should be option where people can rectify the mistake or take measure for the disaster plan.
Understanding Security Risk and Risk Management Plan_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Use of Risk Analysis Techniques in Operational Planning
|8
|4523
|470

Survey on Risk Management in Construction Projects
|3
|1308
|250

Develop Risk Management Plans | Assignment
|8
|824
|27

Concept of Risk Management | Report
|5
|994
|51

Risk Management for Taxi Booking Application
|5
|901
|480

Insurance and Risk Protection Assignment
|42
|12024
|448