Friday, August 21, 2020

A Report on Information Technology Risk Management

Questions: Task1. For this inquiry you are required to make at any rate two (2) discussion postings, contending either possibly in support of the quantitative technique for chance evaluation. You will be surveyed on what you add to the discussion regarding quality not amount (however your posting ought to at the very least be a couple of sentences long). You may either make new string or answer to a past posting. Every new string ought to contain the title Quantitative Debate (I will do the posting, simply need 2 contentions with refs to put together the presents with respect on please) 2. Study Exhibits 61.1 and 61.2 from Reading 3, and answer the accompanying questions:(a) Explain in your own words what is implied by the terms Sweet Spot and Discretionary Area (see Exhibit 61.1) (b) Explain the criticalness of a security choice that is situated to one side of the Sweet Spot yet outside the Discretionary Area (see Exhibit 61.1). (c) Explain the essentialness of a security choice that is situat ed to one side of the Sweet Spot yet at the same time inside the Discretionary Area (see Exhibit 61.1). (d) Explain why you think the Defined Highest Acceptable Risk is situated on the Sweet Spot, however the Defined Lowest Acceptable Risk is situated to one side of the Sweet Spot (see Exhibit 61.2).3. In Reading 7 for this subject, Ozier states that The [ALE] calculation can't recognize viably between low recurrence/high-sway dangers, (for example, fire) and high-recurrence/low effect dangers, (for example, abuse of assets). Clarify why this is the situation. Give a suitable guide to represent your clarification. 4. (Note: Make sure you show ALL your working for this inquiry) The accompanying danger measurements have been assembled by a hazard chief. In view of these, compute the ALE for every danger. 5. (Note: Make sure you show ALL your working for this inquiry) Using the figures you determined above, decide the relative ROSI (return on security speculation) for every one of similar dangers with the accompanying controls set up. Recall that a solitary control may influence more than one danger, and you have to consider while computing the ROSI. In light of your figurings, which controls ought to be bought? 6. Consider the information in the two tables that show up in questions 4 and 5 above. Now and then a control may influence the expense per episode and here and there the event recurrence, and once in a while both. Why would that be the situation? Show your answer with a model drawn from the information provided.7. It is 1999 and you are the hazard administrator for an enormous monetary foundation. You apply the Jacobsons Window model (Reading 11) to decide your companys favored reaction to the approaching Y2K bug. As indicated by the model, would it be advisable for you to acknowledge, relieve, or move the Y2K hazard? Why? Do you concur with the models proposals? Why or why not? 8. (Note: Make sure you show ALL your working for this inquiry) You need to convince the board to put resources into a mechanized fixing framework. You gauge the expenses and advantages throughout the following five years as follows: Benefits: Year 1 Year 2 Year 3 Year 4 Year 5 $2,000 $2,500 $4,000 Costs: Ye ar 1 Year 2 Year 3 Year 4 Year 5 $3000 $2000 $750 $250 Calculate the Net Present Value (NPV) for this venture. Accepting that administration has set the Required Rate of Return at 10%, should the speculation be made? Why or why not?9. There are various subjective hazard appraisal models that are accessible for use, for example, FRAAP, OCTAVE, OWASP and CRAMM. Pick one of these models and quickly depict how hazard appraisal is led under this model. Portray a model circumstance where you could utilize this chose model. Give your evaluation of the legitimacy, or something else, of this hazard appraisal model. Answers: 1. Quantitative Debate Post 1 (Supporting quantitative strategy for chance appraisal) According to a reality, quantitative strategy under hazard appraisal alludes to a specific procedure that measures the measure of hazard dependent on the already distinguished degree of hazard. Usage of those apparatuses of hazard appraisal have extended the degree of understandability including that of sufficiency, thus hazard might be effectively unmistakable. It grasps an expressive issue that is related to each phase of the particular hazard appraisal (. ., 2007). To this respect, on assessing the subtleties of this strategy it might be distinguished that by utilizing these consecutive stages one may effectively bring up the various risks, results of those dangers it they exist by any means, likelihood of the perils, and traits of those dangers. Along these lines, it might be said that quantitative strategy for surveying hazard incorporates viable designing, budgetary elements, and that of environmental examination. Post 2 (Supporting quantitative strategy for hazard appraisal) On as opposed to the quantitative strategy of hazard assessment, this methodology of quantitative examination gives an increasingly point by point situation. A definitive reason for giving expanded concentration upon quantitative methodology of evaluating hazard is that to survey the nearness of all dangers by methods for this methodology. This is said to join both likelihood of key perils just as their effects. Subsequently, this methodology makes it simpler to determine which hazard requires to be dealt with according to its need. 2. Examining sub-questions Sweet Spot and Discretionary Area: For lessening the risks and their event, association fuses a successful data security framework. For executing such a viable security framework, it is significant for the associations to take up certain measure of cost. Another reality in such manner is that the degree of proficiency of a security framework is in actuality legitimately corresponding to cost (Adler, Leonard Nordgren, 1999). On the opposite side, improved security framework alludes to the happening of hazard would decrease, which means chance is conversely relative to the degree of brought about cost. Presently, if a two-dimensional zone is considered whereby security is to be estimated by methods for even pivot and that of cost by methods for vertical hub, at that point the purpose of crossing point of cost and that of hazard bend, whereby the two dangers and expenses are at harmony, the fact of the matter is known as sweet spot. Additionally, it is significant for each association requires taking up probably some measure of cost to oversee hazard, and there are some degree of dangers that may not be diminished. Along these lines, if the predefined most reduced cost, least degree of hazard which can't be diminished and every single current practice related to chance anticipation are at the same time considered, at that point the space in that dimensional region is called optional zone. Security choice situated towards the privilege of Sweet Spot and outside of Discretionary Area: According to the given figure, we can say that in such specific setting, expanding parts of security alludes to some degree of costs that has equal endless supply of hazard as the degree of hazard diminished similarly as that of the improvement of security concerns. Conversation: The purpose for this setting is the resulting to that of Sweet Spot, and the corresponding danger decrease rate has become lower than the gradual pace of brought about cost. 3. Contentions are raised that calculation didn't prevail to recognize in the midst of the high effect/low recurrence dangers just as high recurrence/low effect risk. For example, fire is viewed as low recurrence high effect risk just as abuse of assets is low effect high recurrence threat(Yokouchi, 2007). The calculation ALE couldn't make appropriate separation in the midst of the two dangers. The reason might be clarified alongside a model. At the point when an association stresses upon the hazard misfortune gauges, Annualized Loss Expectancy might be assessed. For count of this, the recipe use is: Annualized Loss Expectancy = Asset Value * Exposure factor According to the given equation, it might be distinguished that on estimating the annualized misfortune anticipation, by and large two variables are thought of: advantage an incentive just as introduction factor. On duplicating these two factors, the result is single misfortune introduction. Along these lines, it just estimates the one measurement named chance (Adler, Leonard Nordgren, 1999). In this manner, it doesn't prevail with regards to recognizing the recurrence just as effect or accentuation on the result. In matter of low recurrence/high effect risk, the result greatness may harmonize with the result of high recurrence/low effect danger. In this way, in actuality it might be expressed that misrepresentation approach of ALE calculation might be viewed as key factor related with coming up short of drawing unmistakable contrast in the midst of low recurrence/high effect risk and that of high recurrence/low effect danger. 4. Risk Cost per episode Event recurrence SLE ARO Lager Programming theft $600.00 1 every month 600 52 $31,200.00 PC infection/worm $2,000.00 1 every month 2000 12 $24,000.00 Data robbery (programmer) $3,500.00 1 for every 3 months 3500 4 $14,000.00 Data robbery (worker) $6,000.00 1 for every 4 months 6000 3 $18,000.00 Refusal of-administration assault $11,000.00 1 for every 2 years 11000 0.5 $5,500.00 PC robbery $4,000.00 1 for every 5 years 4000 0.2 $800.00 Web mutilation $1,500.00 1 for every 2 years 1500 0.5 $750.00 Fire $500,000.00 1 for every 10 years 500000 0.1 $50,000.00 Flood $300,000.00 1 for each 15 years 300000 0.066667 $20,000.00 5. Danger Cost per occurrence Event recurrence SLE ARO Beer Programming robbery $500.00 1 for each 4 months 500 3 $1,500.00 PC infection/worm $1,300.00 1 for each 5 months 1300 2.4 $3,120.00 Data burglary (programmer) $2,000.00 1 for each a half year 2000 2 $4,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.