Risk analysis projects are relatively expensive, and were so even in the mainframe computing era, because they involved the collection and evaluation of a significant volume of data. Earlier risk studies were conducted by in house staff or consultants and the in house people did not have much experience regarding the matter and the consultants did not know much about the requirements of the organization.
Presently, the familiarization task has become more complicated with the complex, multi-site networked and client server-based technology used now. A new system has developed now and here the first description is of the security entry classification and this classification involves object identifiers which will help the security officer to work. For developing this system, the risk assessors have significant knowledge of operating systems, the documentation procedures are versatile and comprehensive enough to makes the data collection task achievable and since the basic system is ready, the cost of updates for risk assessment is minimal. At the same time, the system is fully documented and this documentation can be updated regularly, and the new system will reduce the costs and efforts for exercises in risk assessment.
The Risk Data Repository is a risk analysis model, which was developed some years ago, and the objective was to integrate all available organizational data concerning security. The model can evolve over time as it incorporates newly acquired data. The RDR describes entities in term of their roles from a security viewpoint, and demonstrates the inter-relationships of security data. The RDR essentially has three domains: Environment, Platforms and Assets. The environment domain includes elements that effectively host or support the operation of the information processing system: equipment, building, and staff. The proposed usage of this model is for assessing risk and designing the security system. The information security environment has had radical changes over the last ten years. Organizations are now dependent on the effective operation of their information systems, and these systems also have...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now