Lab 0
Lab 0
Information Systems
Objectives
http://fpt.edu.vn 05/20/202 2
4
Course Learning Outcomes
• Understand the fundamental concepts of risk management and its importance.
• Understand methods of mitigating risk by managing threats, vulnerabilities, & exploits.
• Identify compliance laws, standards, best practices, & policies of risk management.
• Describe the components of an effective risk management plan.
• Describe approaches for identifying & analyzing relevant threats, vulnerabilities, & exploits.
• Describe the process of performing risk assessments.
• Identify assets and activities to be protected within an organization.
• Identify and analyze threats, vulnerabilities, & exploits.
• Identify and analyze risk mitigation security controls.
• Describe the process of planning risk mitigation throughout an organization.
• Describe the process of implementing a risk mitigation plan.
• Perform a BIA.
• Review a BCP based on the findings of a given risk assessment for an organization.
• Review a DRP based on the findings of a given risk assessment for an organization.
• Review a CIRT plan for an organization.
http://fpt.edu.vn 05/20/202 3
4
Knowledge Flow
1. Risk Management Fundamentals
1 Risk Management 2. Managing Risk: Threats, Vulnerabilities, and Exploits
3. Maintaining Compliance
4. Developing a Risk Management Plan
http://fpt.edu.vn 05/20/202 5
4
Risk Mitigation
http://fpt.edu.vn 05/20/202 6
4
Risk Mitigation Plans
http://fpt.edu.vn 05/20/202 7
4
References
[1] Darril Gibson, Managing Risk in Information Systems, 2nd Edition, Jones & Bartlett Learning,
2015.
[2] Seymour Bosworth, M.E. Kabay, Eric Whyne (eds.), Computer Security Handbook, 6th
Edition, 2 Volumes, Parts II, VII, John Wiley & Sons, 2014.
[3] W. Krag Brotby, Information Security Management Metrics: A Definitive Guide to Effective
Security Monitoring and Measurement, CRC Press, 2009.
[4] Jack Freund, Jack Jones, Measuring and Managing Information Risk: A FAIR Approach,
Butterworth-Heinemann, Elsevier, 2015.
[5] Leighton R. Johnson, Security Controls Evaluation, Testing, and Assessment Handbook,
Syngress, 2016.
[6] Thomas R. Peltier, Information Security Risk Analysis, 3rd Edition, CRC Press, 2010.
[7] vLab Solutions, 2015, Managing Risk in Information Systems: Laboratory Manual to
Accompany version 2.0, Jones & Bartlett Learning
http://fpt.edu.vn 05/20/202 8
4