preview

A Complete Risk Mitigation Strategy

Better Essays

A complete risk mitigation strategy that completely outlines your plans to mitigate risks associated with operating in the 21st century workplace.
This task will be completed using the Risk Management Process this process has the following headings which will be elaborated on during the final project. Background Planning, Asset Analysis, Threat Analysis, vulnerability Analysis, Risk Identification, Risk Analysis, Risk Treatment, Monitoring Risk.
Select an accrediting body to ensure IA is not only a process but a part of organizational culture going forward
While in most cases certification and accreditation is often received from a governmental body some are also received from international sources as well. During this section I will …show more content…

References: Peltier, T. R. (2016) Information Security Policies Procedures, and Standards:
Guidelines for effective information security management. CRC Press
Schou, C., Hernandez, S. (2014). Information Assurance Handbook: Effective Computer Security and Risk Management Strategies. McGraw-Hill, ISBN:9780071821650
NATIONAL INSTITUTE of STANDARDS AND TECHNOLOGY, U.S. Department of Commerce. https://www.nist.gov/cyberframework
Contact Info: cyberframework@nist.gov Headquarters, 100 Bureau Drive, Gaithersburg, MD 20899. Peltier, T. (2013). Information Security Fundamentals, (2nd edition). CRC Press. ISBN: 13: 978-1-4398-1062—0 (Paperback)
American Psychological Association. (2010). Publication manual of the American Psychological Association (6th Edition). Washington, DC: Author. ISBN: 1-4338-0561-8
National research Council. (1983). Risk assessment in the federal government: managing the process. National Academies Press.
Macleod, Andrew, A. (2015) Journal of business continuity & emergency planning: Effective information management and assurance for a modern organization during a crisis. ISSN 1749-9216 volume 9 issue 1 page 52 PMID 26420395 http://web.a.ebscohost.com.ezproxy1.apus.edu/ehost/pdfviewer/pdfviewer?sid=41d53605-6335-4776-9135-6d7e105ee507%40sessionmgr4008&vid=1&hid=4109# BIBLIOGRAPHY
Althobaiti, M. M. (2016). Users ' awareness of visible security design flaws; international Journal of

Get Access