ACCT 484 Lecture Notes - Lecture 23: Risk Assessment, Security Awareness, Disaster Recovery Plan

36 views2 pages

Document Summary

Determine what controls you want to put into place. Determine which risk can be ignored and what we should have insurance. Risk mitigation strategies for: do nothing, risk avoidance, risk prevention, risk planning, risk recognition, risk insurance. Control categories table 9. 5: technical controls. Detection and recovery (corrective: formal controls. Recovery (corrective: you are in charge of risk management related to information security at a fortune. Risk evaluation and assessment: sec mandates that you document it every three years, i2s2. Principles for technical aspects of is security: exclusive emphasis on policy and designing it in a top-down manner is counterproductive. Rationally planned strategy does not necessarily consider the ground realities. Constantly changing and dynamic nature of the field makes it rather difficult to formulate grandiose strategies and wait for them to play out: formal models for maintaining the confidentiality, integrity, and availability (cia) of information is important.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents

Related Questions