Course Name: IAA202 Student Name: Chế Công Đại: Risk planning Risk identification
Course Name: IAA202 Student Name: Chế Công Đại: Risk planning Risk identification
Course Name: IAA202 Student Name: Chế Công Đại: Risk planning Risk identification
Risk mitigation Risk reduction – Taking the mitigation steps necessary to reduce the overall risk
to an asset.
Risk sharing/transference– The organization shares its risk with third parties
through insurance and/or service providers
Risk avoidance
Risk acceptance
Risk monitoring A risk-monitoring dashboard should monitor the following attributes related to
risk:
Risk type: Technical or business or operations
Risk priority: Technical or business priority of the risk
Risk probability: The likeliness of risk occurrence
Risk impact: Material impact on software/business due to risk occurrence
Risk mitigation plan: A comprehensive plan to mitigate or minimize the risk
occurrence.
Course Name: IAA202
Student Name: Chế Công Đại
10. From your scenario perspective, with which compliance law or standard does your organization have
to comply? How did this impact the scope and boundary of your IT risk management plan?
Compliance
11. How did the risk identification and risk assessment of the identified risks, threats, and vulnerabilities
contribute to your IT risk management plan table of contents?
-It was detailed properly to locate provided information needed.
12. What risks, threats, and vulnerabilities did you identify and assess that require immediate risk
mitigation given the criticality of the threat or vulnerability?
- Among other things, faculty and/or students weak or being subject to falling short to financial, pleasure or
any other immoral selfish gain.
Course Name: IAA202
Student Name: Chế Công Đại
13. For risk monitoring, what techniques or tools can you implement within each of the seven domains of
a typical IT infrastructure to help mitigate risk?
- Anything possible, man or man-made to properly assess, identify and deal with possible risks.
14. For risk mitigation, what processes and procedures are needed to help streamline and implement risk
mitigation solutions to the production IT infrastructure?
-Control, remediation, assess and reporting are key
15. How does risk mitigation impact change control management and vulnerability management?
- Change control is a systematic approach to change within an organization that can prevent services from
being disrupted and, if they are, provide a plan to restore them as quickly as possible.