SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 5 Issue 1, November-December 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD37916 | Volume – 5 | Issue – 1 | November-December 2020 Page 361
Risk Management
Dr. C. Umarani1, Shriniketh D2
1Associate Professor, 2Student,
1,2Masters in Computer Applications, Jain (Deemed-to-be) University, Bangalore, Karnataka, India
ABSTRACT
Risk management is one of the main concepts that have been used by most of
the organisations to protect their assets and data.
One such example would be INSURANCE. Most of the insurance like Life,
Health, and Auto etc have been formulated to help people protect their assets
against losses.
Risk management has also extended its roots tophysical devices,suchaslocks
and doors to protect homes and automobiles, password protected vaults to
protect money and jewels, police, fire, security to protect against other
physical risks.
Keywords: RISK MANAGEMENT, CYBER FORENSICS
How to cite this paper: Dr. C. Umarani |
Shriniketh D "Risk Management"
Published in
International Journal
of Trend in Scientific
Research and
Development(ijtsrd),
ISSN: 2456-6470,
Volume-5 | Issue-1,
December 2020,
pp.361-363, URL:
www.ijtsrd.com/papers/ijtsrd37916.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
What is cyber security risk management?
When it comes to real world doors, locks and vaultsareused
whereas IT departments depend on a combination of
strategies, policies and procedures.
Employees are educated about the technologies and
vulnerabilities in order to protect the organisation against
cyber security attacks that can compromise systems.
There is a linear growth in cyber attacks as well as cyber
security risk management systems.
Organisations hire employees well versed in the field of
information security and forma teamcybersecurityincident
response management team.
The idea of cyber security risk management comesfromreal
world risk management which is then applied in cyber
world.
Identifying risks and vulnerabilities,applyingadministrative
actions and comprehensive solutions are all involved in
cyber security risk management system.
Implementation of Risk Management System:
Prior to the setting up of the cybersecurity risk management
system, the organisation needs to list the assets it needs to
protect and prioritise it.
The technology, infrastructures and thepotential risksdiffer
from organization to organisation.
Most financial services firms and healthcare organizations
have regulatory concerns along with the business concerns
in parallel that need to be addressed in a cyber security risk
management system.
It is important to follow a layered structure whenitcomesto
cyber security with additional security for other important
assets like customer data and corporate data.
It is important to keep the organisation clean and maintain
the reputation as reputational harm from a breachcancause
more damage than the breach itself.
Citrix recommends that organizations have fully
documented and implemented procedures for all activities
which create cyber security risks.
Risk Management Process:
Before we go on with risk management process, it is
important to understand the severity of risk and then
determine the solution.
No system is 100% secure if anybody wants to make their
system 100% secure then it has to be inaccessible by a
means, which is practically impossible. If at all the system is
locked down, it becomes harder for authorised personnel to
conduct business. If authorised people cannot find the data
and information that they require to conduct their business,
they may look for alternatives which may compromise
systems.
IJTSRD37916
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD37916 | Volume – 5 | Issue – 1 | November-December 2020 Page 362
There are a few recommendations by Deloittewhichtherisk
management process follows the Capability MaturityModel.
This approach has 5 steps in it:
Initial
Repeatable
Defined
Managed
Optimizing
If network systems are connected in a way that intrusion
into an unimportant area can provide anunauthorizedentry
into more important systems and more sensitive data, then
even a small risk can be the reason for huge losses.
RISK MITIGATION:
The following points should be kept in mind in order to
mitigate the risk:
The devices with internet access should be limited.
Network Access Control should be installed properly.
The number of people with administrator credentials
and access control rights for each admin should be
restricted.
Operating systems should be automatically patched.
Older operating systems should be restricted or limited as
they do not have security patches that are up-to-date.
Firewalls should be installed.
Security patches should be up-to-date and antivirus
programs should be installed.
Two-factor authentication should be setup in order to
gain access to certain confidential files and systems.
Current IT governance structure should be evaluated in
order to ensure the checks and balances throughout the
organisation and system.
Apart from the above recommendations, there are a few
more recommendations for enhanced risk management.
Advanced Encryption:
Encryption has been a very old feature in databases, but in
the present world and IT scenarios. It is important to
implement encryption in a more strategic and systematic
way to protect data from data breach.Granular role-based
access, standards-based cryptography, advanced key
management etc. are all included in advanced encryption.
These methods and algorithms decrease exposure of data to
a great extent. Encryption is helpful in protecting against
outside breaches but it doesn’t help in internal data theft. If
the employees within an organisation have access to
sensitive data then they will definitely have the credentials
to decrypt it. Hence the access to sensitive data should be
limited to very few and authorised personnel.
Element-level security:
It is important for companies toimplementcustomaswell as
out-of-the-box rules as security at every level and in each
and every element is very necessary and important.
INCIDENT RESPONSE:
The approach to addressing andmanagingtheaftereffectsof
the security breach or an IT incident is known as incident
response. Its main goal is to manage the situation in such a
way that the damage is limited and the recovery time and
costs is reduced. All the activities and actions of the incident
response management is performed by an organisation’s
computer security incident response team.
INCIDENT RESPONSE PLAN:
This is the methodology used by an organization to respond
and resolve a cyber attack.
an attack to the organisation can affect its customers,
company time and its resourcesanditsreputationandbrand
value.
PHASES OF AN IRP:
Preparation: This is the first phase of an IRP is
preparation where the policies and procedures are
developed to follow in the course of a cyber breach.
Identification: This is the phase where the breach is
detected and the response is quick and focused.
Containment: Thisstepinvolvesinanalysingthedamage
and stopping the attack from further penetration.
Eradication: The threat is neutralized and internal
systems are restored.
Recovery: The affected systems should be validatedand
should be returned to working condition.
Lessons learned: The future possible threats are
analysed and preventive measures are taken.
Incident Prevention:
Educate employees in cyber security principles.
Physical access to computers and network components
should be controlled.
Change passwords regularly.
Firewall should be setup.
Keep the security software up-to-date.
CYBER FORENSICS
Cyber/Computer forensicsis themethodortechniqueof
analysing ways to gather and preserve evidences and
later present it to the court of law.
Most of the cyber forensics’ specialists/analysists make
use oftheir knowledge in computer science and forensic
skills in order to retrieve information from the
computer or storage devices that have been ceased in
the particular case during investigation.
One of the major and the most important steps for
forensic investigation is the FORENSIC IMAGING where
in the investigator takes an exact copy of the original
evidence before moving on with the investigation and
extraction of data from the evidence or media.
ROLE OF CYBER FORENSICS IN RISK MANAGEMENT:
In the occurrence of an incident like a breach or a
natural disaster, the Incident ResponseTeamactsbased
on a predefined set of rules.
Here, the application of computer forensics plays an
important role in permitting in-depth analysis of all the
evidence gathered by the incident response team.
Most of the times forensic analysis occurs in the later
stages of the operations headed by the IRT and hence is
a vital part of the Post Incident Analysis.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD37916 | Volume – 5 | Issue – 1 | November-December 2020 Page 363
Digital forensics is mainly focused in understanding the
end result of a digital incident and hence represents the
tip of the pyramid which is the life cycle of a security
incident.
Within the Post Incident Analysis phase a few standard
process techniques have made an important place:
CONCLUSION:
Department of Energy project directors, programmanagers,
and senior managers have the responsibility to assess and
manage risks on their projects andprojectportfolios.Project
risks can be managed to successful conclusions through the
following basic actions:
Establish and maintain management commitment to
performing risk management on all capital projects.
Start the risk management process early in the project
life cycle—prior to approval of mission need.
Include key stakeholders in the process, with the DOE
project director as the lead and the integrated project
team (IPT) intimately involved in the process.
Evaluate project risks and risk responses periodically
during the project life cyclethroughapproval ofthestart
of operations.
Develop risk mitigation plans and update them as the
project progresses.
Follow through with mitigation actions until risks are
acceptable.
Tie a project’s level of risk to cost and schedule
estimates and contingencies.
Effectively communicate to all key stakeholders the
progress and changes to project risks and mitigation
plans.
An example of a risk assessment tool that uses some of the
risk assessment methods discussed in this report is the
Construction Industry.
REFERENCES:
[1] Risk management system for ERP software
project
2013 Science and Information Conference
Year: 2013 | Conference Paper
[2] Management of Complex Project Risks Based on
Qualitative Assessments
International Conference "Managementoflarge-scale
system development" (MLSD
Year: 2018 | Conference Paper
[3] A Study of Software Development Project Risk
Management
International Seminar on Future Information
Technology and Management Engineering
Year: 2008 | Conference Paper
[4] Optimal Risk Response plan of project risk
management
IEEE International Conference on Industrial
Engineering and Engineering Management
Year: 2011 | Conference Paper

Mais conteúdo relacionado

Mais procurados

Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1securityAnne Starr
 
Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurestorm
 
Information risk management
Information risk managementInformation risk management
Information risk managementAkash Saraswat
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk ManagementHamed Moghaddam
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsPaul Feldman
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Education & Training Boards
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101Jerod Brennen
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSJohn Gilligan
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data SecurityImperva
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptxPiyush Jain
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachAnchises Moraes
 
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series  SEIM Log AnalysisCybersecurity Series  SEIM Log Analysis
Cybersecurity Series SEIM Log AnalysisJim Kaplan CIA CFE
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 

Mais procurados (20)

Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
 
Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk Managment
 
Information risk management
Information risk managementInformation risk management
Information risk management
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
It risk assessment
It risk assessmentIt risk assessment
It risk assessment
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series  SEIM Log AnalysisCybersecurity Series  SEIM Log Analysis
Cybersecurity Series SEIM Log Analysis
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 

Semelhante a Risk Management

Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMChristopher Nanchengwa
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docxtoltonkendal
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentBradley Susser
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimemuhammad awais
 
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...Ahad
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic SecurityChad Korosec
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USACompanySeceon
 

Semelhante a Risk Management (20)

Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
CCA study group
CCA study groupCCA study group
CCA study group
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Avoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of ITAvoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of IT
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
 
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic Security
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USA
 

Mais de ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

Mais de ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Último

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Último (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Risk Management

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 5 Issue 1, November-December 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD37916 | Volume – 5 | Issue – 1 | November-December 2020 Page 361 Risk Management Dr. C. Umarani1, Shriniketh D2 1Associate Professor, 2Student, 1,2Masters in Computer Applications, Jain (Deemed-to-be) University, Bangalore, Karnataka, India ABSTRACT Risk management is one of the main concepts that have been used by most of the organisations to protect their assets and data. One such example would be INSURANCE. Most of the insurance like Life, Health, and Auto etc have been formulated to help people protect their assets against losses. Risk management has also extended its roots tophysical devices,suchaslocks and doors to protect homes and automobiles, password protected vaults to protect money and jewels, police, fire, security to protect against other physical risks. Keywords: RISK MANAGEMENT, CYBER FORENSICS How to cite this paper: Dr. C. Umarani | Shriniketh D "Risk Management" Published in International Journal of Trend in Scientific Research and Development(ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1, December 2020, pp.361-363, URL: www.ijtsrd.com/papers/ijtsrd37916.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) What is cyber security risk management? When it comes to real world doors, locks and vaultsareused whereas IT departments depend on a combination of strategies, policies and procedures. Employees are educated about the technologies and vulnerabilities in order to protect the organisation against cyber security attacks that can compromise systems. There is a linear growth in cyber attacks as well as cyber security risk management systems. Organisations hire employees well versed in the field of information security and forma teamcybersecurityincident response management team. The idea of cyber security risk management comesfromreal world risk management which is then applied in cyber world. Identifying risks and vulnerabilities,applyingadministrative actions and comprehensive solutions are all involved in cyber security risk management system. Implementation of Risk Management System: Prior to the setting up of the cybersecurity risk management system, the organisation needs to list the assets it needs to protect and prioritise it. The technology, infrastructures and thepotential risksdiffer from organization to organisation. Most financial services firms and healthcare organizations have regulatory concerns along with the business concerns in parallel that need to be addressed in a cyber security risk management system. It is important to follow a layered structure whenitcomesto cyber security with additional security for other important assets like customer data and corporate data. It is important to keep the organisation clean and maintain the reputation as reputational harm from a breachcancause more damage than the breach itself. Citrix recommends that organizations have fully documented and implemented procedures for all activities which create cyber security risks. Risk Management Process: Before we go on with risk management process, it is important to understand the severity of risk and then determine the solution. No system is 100% secure if anybody wants to make their system 100% secure then it has to be inaccessible by a means, which is practically impossible. If at all the system is locked down, it becomes harder for authorised personnel to conduct business. If authorised people cannot find the data and information that they require to conduct their business, they may look for alternatives which may compromise systems. IJTSRD37916
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD37916 | Volume – 5 | Issue – 1 | November-December 2020 Page 362 There are a few recommendations by Deloittewhichtherisk management process follows the Capability MaturityModel. This approach has 5 steps in it: Initial Repeatable Defined Managed Optimizing If network systems are connected in a way that intrusion into an unimportant area can provide anunauthorizedentry into more important systems and more sensitive data, then even a small risk can be the reason for huge losses. RISK MITIGATION: The following points should be kept in mind in order to mitigate the risk: The devices with internet access should be limited. Network Access Control should be installed properly. The number of people with administrator credentials and access control rights for each admin should be restricted. Operating systems should be automatically patched. Older operating systems should be restricted or limited as they do not have security patches that are up-to-date. Firewalls should be installed. Security patches should be up-to-date and antivirus programs should be installed. Two-factor authentication should be setup in order to gain access to certain confidential files and systems. Current IT governance structure should be evaluated in order to ensure the checks and balances throughout the organisation and system. Apart from the above recommendations, there are a few more recommendations for enhanced risk management. Advanced Encryption: Encryption has been a very old feature in databases, but in the present world and IT scenarios. It is important to implement encryption in a more strategic and systematic way to protect data from data breach.Granular role-based access, standards-based cryptography, advanced key management etc. are all included in advanced encryption. These methods and algorithms decrease exposure of data to a great extent. Encryption is helpful in protecting against outside breaches but it doesn’t help in internal data theft. If the employees within an organisation have access to sensitive data then they will definitely have the credentials to decrypt it. Hence the access to sensitive data should be limited to very few and authorised personnel. Element-level security: It is important for companies toimplementcustomaswell as out-of-the-box rules as security at every level and in each and every element is very necessary and important. INCIDENT RESPONSE: The approach to addressing andmanagingtheaftereffectsof the security breach or an IT incident is known as incident response. Its main goal is to manage the situation in such a way that the damage is limited and the recovery time and costs is reduced. All the activities and actions of the incident response management is performed by an organisation’s computer security incident response team. INCIDENT RESPONSE PLAN: This is the methodology used by an organization to respond and resolve a cyber attack. an attack to the organisation can affect its customers, company time and its resourcesanditsreputationandbrand value. PHASES OF AN IRP: Preparation: This is the first phase of an IRP is preparation where the policies and procedures are developed to follow in the course of a cyber breach. Identification: This is the phase where the breach is detected and the response is quick and focused. Containment: Thisstepinvolvesinanalysingthedamage and stopping the attack from further penetration. Eradication: The threat is neutralized and internal systems are restored. Recovery: The affected systems should be validatedand should be returned to working condition. Lessons learned: The future possible threats are analysed and preventive measures are taken. Incident Prevention: Educate employees in cyber security principles. Physical access to computers and network components should be controlled. Change passwords regularly. Firewall should be setup. Keep the security software up-to-date. CYBER FORENSICS Cyber/Computer forensicsis themethodortechniqueof analysing ways to gather and preserve evidences and later present it to the court of law. Most of the cyber forensics’ specialists/analysists make use oftheir knowledge in computer science and forensic skills in order to retrieve information from the computer or storage devices that have been ceased in the particular case during investigation. One of the major and the most important steps for forensic investigation is the FORENSIC IMAGING where in the investigator takes an exact copy of the original evidence before moving on with the investigation and extraction of data from the evidence or media. ROLE OF CYBER FORENSICS IN RISK MANAGEMENT: In the occurrence of an incident like a breach or a natural disaster, the Incident ResponseTeamactsbased on a predefined set of rules. Here, the application of computer forensics plays an important role in permitting in-depth analysis of all the evidence gathered by the incident response team. Most of the times forensic analysis occurs in the later stages of the operations headed by the IRT and hence is a vital part of the Post Incident Analysis.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD37916 | Volume – 5 | Issue – 1 | November-December 2020 Page 363 Digital forensics is mainly focused in understanding the end result of a digital incident and hence represents the tip of the pyramid which is the life cycle of a security incident. Within the Post Incident Analysis phase a few standard process techniques have made an important place: CONCLUSION: Department of Energy project directors, programmanagers, and senior managers have the responsibility to assess and manage risks on their projects andprojectportfolios.Project risks can be managed to successful conclusions through the following basic actions: Establish and maintain management commitment to performing risk management on all capital projects. Start the risk management process early in the project life cycle—prior to approval of mission need. Include key stakeholders in the process, with the DOE project director as the lead and the integrated project team (IPT) intimately involved in the process. Evaluate project risks and risk responses periodically during the project life cyclethroughapproval ofthestart of operations. Develop risk mitigation plans and update them as the project progresses. Follow through with mitigation actions until risks are acceptable. Tie a project’s level of risk to cost and schedule estimates and contingencies. Effectively communicate to all key stakeholders the progress and changes to project risks and mitigation plans. An example of a risk assessment tool that uses some of the risk assessment methods discussed in this report is the Construction Industry. REFERENCES: [1] Risk management system for ERP software project 2013 Science and Information Conference Year: 2013 | Conference Paper [2] Management of Complex Project Risks Based on Qualitative Assessments International Conference "Managementoflarge-scale system development" (MLSD Year: 2018 | Conference Paper [3] A Study of Software Development Project Risk Management International Seminar on Future Information Technology and Management Engineering Year: 2008 | Conference Paper [4] Optimal Risk Response plan of project risk management IEEE International Conference on Industrial Engineering and Engineering Management Year: 2011 | Conference Paper