• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2023 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project

Question 3

September 7, 2023 by David Lanter 15 Comments

How would you go about creating an information risk profile for a small start-up business? Describe what the risk profile for the business would contain?  How should the business use the risk profile?

Filed Under: Unit 03: Risk Evaluation Tagged With:

Reader Interactions

Comments

  1. Edge Kroll says

    September 10, 2023 at 8:49 pm

    Creating an information risk profile for a small startup involves identifying information assets, assessing threats and vulnerabilities, prioritizing risks, and developing mitigation strategies. This profile should detail identified risks, their potential impact, likelihood, and corresponding mitigation plans. It serves as a dynamic guide for resource allocation, decision-making, and proactive risk management. Regular updates ensure relevance as the business environment evolves. To use the risk profile effectively, the startup should implement risk management policies based on the profile, allocate resources wisely, and continuously monitor and review the document to stay informed about evolving threats. Sharing the profile with stakeholders demonstrates the organization’s commitment to security and assists in safeguarding information assets, ultimately contributing to long-term success.

    Log in to Reply
    • Yannick Rugamba says

      September 12, 2023 at 6:23 pm

      Hey Edge
      I like your perspective, on the concept of “acceptable information system security risk.” You’ve captured the essence of how organizations approach this issue. Based on my experience conducting risk assessments is extremely important. Like patching and updating systems to address new vulnerabilities businesses should continuously reevaluate their risk profiles. This allows them to stay ahead in this evolving landscape.

      Log in to Reply
      • Yannick Rugamba says

        September 12, 2023 at 6:44 pm

        Hey, my bad I was replying your comment about
        “What is meant by the term “acceptable information system security risk”? Who within the organization determines what is the acceptable level of information system risk? How does an organization determine what is an acceptable level of risk?”

        Log in to Reply
    • Yannick Rugamba says

      September 12, 2023 at 6:59 pm

      Hey,

      I’ve reviewed your response on creating an information risk profile, and it’s quite comprehensive. Your approach to identifying assets and threats, and then crafting a mitigation strategy, is spot-on.
      From my point of view, I can emphasize the importance of the dynamic nature you’ve highlighted for the risk profile. Threats evolve, and startups especially need to stay agile. Your point on the profile guiding resource allocation is crucial. However, based on my experience, it might be worth delving deeper into some specific IT challenges startups often grapple with, such as cloud-based vulnerabilities or the nuances of remote work setups.
      Also, your mention of sharing the profile with stakeholders is a valuable insight. It does set a precedence about the organization’s commitment to protecting its assets.

      Log in to Reply
    • Celinemary Turner says

      September 12, 2023 at 10:23 pm

      Edge, you made a valid point in your explanation.”Continuously monitoring and review. I believe these very essential to ensure the security of the information assets in the start-up business. e.g. customer data, employee accounts, and financial records. Also, continuous and regular monitoring is one of the vital keys to the success of the business

      Log in to Reply
  2. Celinemary Turner says

    September 10, 2023 at 10:47 pm

    Creating information risk profile for a small startup business, here is how I will go about it. First, I will identify and classify all information assets within the business. This may include data, hardware, software, and human resources. such as customer data, employees account and financial records. Next, I will assess potential threats and vulnerabilities that could affect these assets. These could be physical theft, weak password, and data breaches. Moving forward, I will assess the likelihood of each threat exploiting specific vulnerabilities and carry out impact analysis. This analysis will help prioritize risk based on their severity and probability. I will develop risk mitigation strategies to address the most critical risks. Risk ownership will be put in place that will be responsible for managing each risk within the organization and ensure accountability for risk management activities. Conclusively, I will implement regular monitoring, review processes, and continuously assess the effectiveness of risk mitigation strategies and update the risk profile as the business grows evolves.
    The risk profile of the business will contain these: Asset inventory, threat assessment (description of potential threat). Vulnerabilities assessment, likelihood and impact analysis, risk mitigation strategies (detail plans for mitigating each identified risk e.g. control, policies and procedures). Finally, risk ownership and accountability (clear designation of who is responsible and managing each risk.
    The business should use the risk profile as a reference for decision -making related to security investments, policies, and procedures. The risk profile can be used to educate employees about the potentials risk and their roles in risk mitigation. Risk profile is used in the business to provide a structured approach to safeguarding critical assets and enables the business to optimize resources allocation.

    Log in to Reply
    • Edge Kroll says

      September 12, 2023 at 9:04 pm

      Hi,

      This is quite the detailed strategy you’ve cooked up. I really liked how you emphasized the use of the risk profile being used to educate employees. As a business, it is critical that all of your employees are informed of all potential risks that come from their day-to-day operations. This way they not only know how to react if something does happen, but they are able to act preventatively in order to stop risks before they can take place.

      Log in to Reply
  3. Hashem Alsharif says

    September 10, 2023 at 11:04 pm

    Given that this would be for a small business, I would keep in mind that it has a different process as opposed to a large corporation. First, because this is an information risk profile, there are key factors that must be met. This would be a portfolio composed of Identified IT risk which the small business is exposed to, and each risk would have a measure to determine it’s level. As was mentioned in a previous class, new startup companies tend to not focus on IT Auditing as much as other areas in their business. I would express to the small business the importance of identifying potential risks. After expressing the importance, I would then go into detail about what type of business they are. Rather it be finance, IT, or entertainment. I would need to know what information is held and what would happen should this information were to be stolen. Once we know the level of importance with different pieces of information, I would go over different ways to mitigate the risk, such as two factor authentication, storing data in appropriate areas, and tracking every company device activity. Because this is a small business, I would have to keep costs in mind. I small business most likely would not have the budget to implement the same things as a corporation. So while I would examine risks and how to mitigate them, I would also need to see how that could be achieved in the most cost effective way.

    Log in to Reply
  4. Nicholas Nirenberg says

    September 10, 2023 at 11:50 pm

    To create an information risk profile for a small business the following steps should be taken. First, you must take a total inventory of all of the organization’s assets, and estimate their value to the company. Then, you must evaluate all known vulnerabilities and threats. This includes how probable they are, the scope of the assets they target, as well as the category of risk. Next, set up the most appropriate risk mitigation plan for risks deemed unacceptable based on the evaluation of the at-risk assets and the probability of the risk, starting with risks which were evaluated to be the most prioritized. The information risk profile should contain a comprehensive list of risks and if they are acceptable, and a plan for mitigation of risks deemed unacceptable. The business should use the profile to assess their risks and to create plans for how best to mitigate unacceptable risk. The plan should include policies aimed at mitigating the risks most prioritized in the profile.

    Log in to Reply
  5. Eyup Aslanbay says

    September 11, 2023 at 7:35 pm

    Creating an information risk profile is important for any business, regardless of its size, including small start-ups. But creating an information risk profile for a small startup business is necessary to identify and manage potential risks to the business’s information assets. Small start-ups often handle sensitive customer data or financial information. Creating an information risk profile helps identify the data assets you need to protect and the potential risks to those assets. This can include risks related to data breaches, theft, or unauthorized access.

    Log in to Reply
  6. Jon Stillwagon says

    September 12, 2023 at 4:38 pm

    I would start by doing a risk aggregation and risk scenarios method. The risk scenarios would give me what would happen in case the risk was to happen. The risk aggregation would combine the individual risks in place and integrate them into a single risk profile. The risk profile would contain all the risks and risk scenarios that could expose the company negatively or harshly. It would also contain either a top-down approach or a bottom-up approach as well as a risk analysis of each given risk scenario. The business should use the risk profile to determine which risks have the most extreme impact and which risks have the least impact. Then they should use it in their report to the board of directors to keep them informed about each situation. Then finally determine which risk should be acceptable or not.

    Log in to Reply
    • Nicholas Nirenberg says

      September 12, 2023 at 7:36 pm

      Hi Jon, I like how at the end you mention that the finding should be reported to the board of directions to keep them in the loop, it’s something I didn’t think about that specifically. I think it’s useful to remember that the end point of most risk evaluations is going to be reporting your finding to people higher in the organization who will ultimately decide what actions to take based of your analysis and recommendations, and to keep that in mind when gather and compiling data.

      Log in to Reply
  7. Bo Wang says

    September 12, 2023 at 9:54 pm

    Because it is a small company, the risk profile is more focused on the risk of the more important company assets. The description of the enterprise risk profile includes the description of the enterprise’s objectives, strategies and activities as well as the identification and assessment of potential risks affecting the achievement of the enterprise’s objectives. Enterprises manage risk by using risk profiling to allocate different resources.

    Log in to Reply
  8. Yannick Rugamba says

    September 12, 2023 at 11:07 pm

    When it comes to starting a cloud service with Windows, we have a lot of tasks to handle. First let’s outline our assets. Such, as our server configurations and scripts. These are like the tools we rely on.

    Next let’s identify threats. When using Windows this could include things like access attempts or system vulnerabilities. It’s important to be aware of areas where our system might encounter difficulties.

    Once we’ve identified the threats it’s crucial to prioritize them. Not everything requires attention. There are certain things that cannot be overlooked.

    What should be our course of action? We need to implement security measures to Windows keep everything up to date regularly and make use of cloud defenses. Following this step-by-step guide will help us ensure the safety of our systems.

    In essence our risk profile functions as a manual, for maintaining safety. It highlights areas where risks may arise and provides guidance on how to address them… Remember, as circumstances change over time it is important to review and update this manual in order to stay ahead of potential challenges. Let’s prioritize safety!

    Log in to Reply
  9. Ooreofeoluwa Koyejo says

    September 17, 2023 at 7:46 pm

    For a small startup business, knowing the principle of risk management is to ensure the cost allocated or used to protect information assets should not exceed the value of the information assets, I will use the process listed as a guide for the creation of an information risk profile:
    1. Identify the assets and business processes.
    2. Assess the vulnerabilities, threats, likelihood, probability, and impact of cyberattacks to determine the risks involved.
    3. Analyze and prioritize the risks based on risk levels (high, medium, and low), risk categories (confidentiality, integrity and availability) in addition to the business impact considerations (financial, productivity and availability)
    4. Identify and implement applicable security controls based on the acceptable level of risk defined by senior management
    5. Monitor the performance of the controls to determine adequacy, sufficiency, and suitability.

    The risk profile of the business will document the type, amount and priority of information risk that an organization finds acceptable which is transparent to the organization based on the input and factors supplied by business stakeholders such as the business leaders, data and process owners, audit teams, legal, compliance, privacy and information risk management teams to assure on accuracy and credibility of the risk profile.

    The small business can use the risk profile for any of the following reasons.
    1. To communicate value and intent to the organization in a language that is easy to understand and apply.
    2. As a tool for decision-making by business leaders and alignment with organizational business strategy
    3. To communicate the alignment with the defined organizational risk appetite (acceptable risk level)
    4. To guide the funding and allocation of resources effectively for the implementation of controls for information risk mitigation.
    5. Useful as a reference for the implementation and integration of other governance frameworks such as the Capability Maturity Model Integration (CMMI)
    6. To inform and serve as input for the business continuity and disaster recovery plans of the organization.
    7. To serve as evidence of due diligence for legal and compliance requirements

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (2)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in