Sponsored Links

Sabtu, 06 Januari 2018

Sponsored Links

Information Security Strategy Template February ppt download
src: images.slideplayer.com

Information Technology Security Assessment (IT Security Assessment) is an explicit study to locate IT security vulnerabilities and risks.


Video Information Technology Security Assessment



Background

In an assessment, the assessor should have the full cooperation of the organization being assessed. The organization grants access to its facilities, provides network access, outlines detailed information about the network, etc. All parties understand that the goal is to study security and identify improvements to secure the systems. An assessment for security is potentially the most useful of all security tests.


Maps Information Technology Security Assessment



Purpose of Security Assessment

The goal of a security assessment (also known as a security audit, security review, or network assessment), is to ensure that necessary security controls are integrated into the design and implementation of a project. A properly completed security assessment should provide documentation outlining any security gaps between a project design and approved corporate security policies. Management can address security gaps in three ways: Management can decide to cancel the project, allocate the necessary resources to correct the security gaps, or accept the risk based on an informed risk / reward analysis.


Male enterprise consultant in blue business suit is initiating ...
src: static1.bigstockphoto.com


Methodology

The following methodology outline is put forward as the effective means in conducting security assessment.

  • Requirement Study and Situation Analysis
  • Security policy creation and update
  • Document Review
  • Risk Identification
  • Vulnerability Scan
  • Data Analysis
  • Report & Briefing

security assessment template
src: www.update234.com


Sample Report

Security Assessment Report should include the following information:

  • Introduction/background information
  • Executive and Management summary
  • Assessment scope and objectives
  • Assumptions and limitations
  • Methods and assessment tools used
  • Current environment or system description with network diagrams, if any
  • Security requirements
  • Summary of findings and recommendations
  • The general control review result
  • The vulnerability test results
  • Risk assessment results including identified assets, threats, vulnerabilities, impact and likelihood assessment, and the risk results analysis
  • Recommended safeguards

Information Technology Assessment | Information Technology ...
src: www.techlockinc.com


Criticisms and Shortcomings

IT security risk assessments like many risk assessments in IT, are not actually quantitative and do not represent risk in any actuarially-sound manner. Measuring risk quantitatively can have a significant impact on prioritizing risks and getting investment approval (Doug Hubbard Hurdling Risk, CIO Magazine 1998).

Quantitative risk analysis has been applied to IT security in a major US government study in 2000. The Federal CIO Council commission a study of the $100 million IT security investment for the Dept. of Veterans Affairs with results shown quantitatively.[1]


Implementing a Security Assessment and Authorization Process ...
src: img.pluralsight.com


Professional Certifications

There are common vendor-neutral professional certifications for performing security assessment.

  • CISSP
  • CISM
  • CISA
  • ISO/IEC 27001:2013 Auditor/Lead Auditor
  • CRISC
  • QSA/ISA

Enterprise Resource Planning Archives | Litcom
src: www.litcom.ca


External links

  • ISC2
  • Information Systems Audit and Control Association
  • SANS Institute

risk assessment checklist template
src: www.update234.com


References

Casas III, Victoriano. 2006. "An Information Security Risk Assessment Model for Public and University Administrators." Applied Research Project. Texas State University. http://ecommons.txstate.edu/arp/109/

Source of the article : Wikipedia

Comments
0 Comments