Map risks and develop a security policy

 Then, it is necessary to map the security risks that the company has. The mapping needs to be very well executed, identifying the possible risks to reduce the impacts that they may generate.


The process needs to be carried out by an information technology professional who has theoretical knowledge in the area, guided by the ABNT NBR ISO / IEC27005: 2008 Standard.


That said, know four steps that should be considered when mapping risks:


Diagnosis and classification of risks

The first step is to know and classify the levels of risks: the context, whether they are associated with governance problems , lack of resources and failures in the system and infrastructure.


2. Risk analysis


After mapping and cataloging the risks, it is necessary to assess the probability of incidents and the level of impact that will be caused in the company, classifying and prioritizing risks, to carry out tests and preventive measures against security incidents.


3. Action plan


The third step involves creating the action plan to manage threats and recover operations, in addition to contingency actions that guarantee the company's operation.

A data center technician should answer questions and take queries from various sources and provide them with the right information. Knowledge of technology requirements is one of the required skills for a data center technician. 

4. Communication Plan


Finally, it is essential to develop a communication plan on the actions and measures for the administrators, managers and employees of the organization.

Comments

  1. I am really impressed with your blog article, such great & useful information you mentioned here. I have read all your posts and all are very informative. Thanks for sharing and keep it up like this.
    바카라
    카지노

    ReplyDelete

Post a Comment

Popular posts from this blog

How to study for such an assessment?

Starting your computer for the first time - important points

Natural Language Processing (PLN)