Map risks and develop a security policy
Then, it is necessary to map the security risks that the company has. The mapping needs to be very well executed, identifying the possible risks to reduce the impacts that they may generate.
The process needs to be carried out by an information technology professional who has theoretical knowledge in the area, guided by the ABNT NBR ISO / IEC27005: 2008 Standard.
That said, know four steps that should be considered when mapping risks:
Diagnosis and classification of risks
The first step is to know and classify the levels of risks: the context, whether they are associated with governance problems , lack of resources and failures in the system and infrastructure.
2. Risk analysis
After mapping and cataloging the risks, it is necessary to assess the probability of incidents and the level of impact that will be caused in the company, classifying and prioritizing risks, to carry out tests and preventive measures against security incidents.
3. Action plan
The third step involves creating the action plan to manage threats and recover operations, in addition to contingency actions that guarantee the company's operation.
A data center technician should answer questions and take queries from various sources and provide them with the right information. Knowledge of technology requirements is one of the required skills for a data center technician.
4. Communication Plan
Finally, it is essential to develop a communication plan on the actions and measures for the administrators, managers and employees of the organization.
I am really impressed with your blog article, such great & useful information you mentioned here. I have read all your posts and all are very informative. Thanks for sharing and keep it up like this.
ReplyDelete바카라
카지노