• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

NIST SP 800-100, Chapter 10 “Risk Management”

January 17, 2024 by David Lanter 18 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 02 - System Security Plan Tagged With:

Reader Interactions

Comments

  1. Eyup Aslanbay says

    January 20, 2024 at 7:44 pm

    One key point I took from NIST SP 800-100, Chapter 10 is risk mitigation. Risk mitigation involves a proactive approach to managing potential threats to information security. It emphasizes the importance of identifying and analyzing risks, then prioritizing them based on their potential impact and likelihood. Risk mitigation is about constantly updating and improving security measures to keep up with new dangers and changes in the organization, ensuring security stays strong over time.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      January 21, 2024 at 1:32 am

      As you have highlighted, risk mitigation is a proactive approach to risk management- it becomes important in the information security program for teams to maximize the practical capacity of the risk mitigation process to be adequate for incident response which covers both identified and potential risks which include data breaches and other relevant security incidents.

      Log in to Reply
    • Celinemary Turner says

      January 23, 2024 at 9:36 am

      Yes, By assessing the potential impact and likelihood of risks, organizations can allocate resources effectively to address the most critical vulnerabilities. The proactive nature of risk mitigation helps in staying ahead of emerging dangers and adapting security measures to evolving circumstances.

      Log in to Reply
    • Jon Stillwagon says

      January 23, 2024 at 8:37 pm

      Risk mitigation is definitely something that should be paid attention to because you want your system to be protected as well as to avoid any potential hazards. Protection of the people’s information is key and you make a valid point about keeping up with new dangers as well as changes in the organization. You want to do this, so the system stays healthy in that manner.

      Log in to Reply
  2. Ooreofeoluwa Koyejo says

    January 21, 2024 at 12:18 am

    From this reading, I understand that risk management is not just an information security function that should be isolated to the technical information security leaders or department but it is a significant business process to support and enable the full realization of an organisation’s mission and vision.

    By this, the risk assessment, analysis and mitigation processes should be incorporated as a continuous process into the SDLC as a norm and not an after-effect.

    Log in to Reply
    • Yannick Rugamba says

      January 22, 2024 at 11:49 pm

      Having a variety of viewpoints, within the team can greatly improve this integration as it allows for an approach that considers both technical and business requirements. It is crucial to align these efforts, with the goals of the organization in order to ensure security management.

      Log in to Reply
  3. Yannick Rugamba says

    January 21, 2024 at 5:37 pm

    The main thing I’ve learned about risk management is that it’s important to recognize and address vulnerabilities. It’s not a matter of identifying threats. Also understanding where our systems might be susceptible and taking steps to strengthen those areas. By being proactive we can prevent breaches. Maintain a strong security position.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      January 21, 2024 at 9:49 pm

      Effective risk management adopts a proactive approach to risk assessment, analysis and mitigation for the protection of information systems.

      Log in to Reply
      • Yannick Rugamba says

        January 22, 2024 at 11:55 pm

        Sure it’s crucial to monitor and update risk assessments. As cyber threats keep evolving our strategies need to adapt. Keeping up with the technology and threat intelligence can significantly enhance the security of our system.

        Log in to Reply
    • Celinemary Turner says

      January 23, 2024 at 9:51 am

      Your insight into risk management underscores a fundamental aspect of a proactive and preventive approach. Recognizing and addressing vulnerabilities rather than solely focusing on identifying threats is a crucial distinction.

      Log in to Reply
  4. Celinemary Turner says

    January 21, 2024 at 6:30 pm

    One key point from reading. NIST SP 800-100 emphasizes the iterative nature of risk management, stressing the importance of continuous assessment and adaptation to evolving threats and vulnerabilities.
    The National Institute of Standards and Technology (NIST) Special Publication 800-100 highlights the dynamic nature of risk management. It underscores the need for an ongoing, iterative process that regularly assesses risks, identifies vulnerabilities, and adapts security measures to address emerging threats. This iterative approach ensures that risk management remains effective despite evolving cybersecurity landscapes and organizational changes.

    Log in to Reply
    • Eyup Aslanbay says

      January 23, 2024 at 9:35 pm

      Your emphasis on the iterative nature of risk management is spot-on and highlights a critical aspect of effective cybersecurity strategies. By stressing the importance of continuous assessment and adaptation, this approach recognizes that the threat landscape is not static but constantly evolving.

      Log in to Reply
  5. Edge Kroll says

    January 21, 2024 at 7:41 pm

    One key point from the reading that stood out to me is that complete mitigation of all risks is not feasible, and there will always be lingering residual risks. While this residual risk may manifest in various aspects of the business, every business decision entails some form of tradeoff, whether in terms of cost or risk avoidance. An organization must weigh the cost-benefit dynamics of a risk management program and assess the level of residual risk. These considerations play a pivotal role in guiding companies toward more informed decision-making regarding their risks. If the residual risk is deemed excessively high, it serves as a valuable focal point for leaders to identify areas for improvement.

    Log in to Reply
    • Celinemary Turner says

      January 23, 2024 at 9:44 am

      Yes, I agree with your observation about the inevitability of residual risks and the need for organizations to make informed decisions regarding risk management.

      Log in to Reply
  6. Jon Stillwagon says

    January 21, 2024 at 8:14 pm

    In the NIST SP 800 – 100 The key point I took was about the system development life cycle which starts by declaring what requirements for a system is needed so it can then be purchased or designed. Then it goes into testing phase so it can be installed and to see how it holds up from the daily uses, basically a stress test. Once that is complete the system is put into use for the company until a new system comes along to take its place. The systems that we have in place can sometimes be outdated quickly and some may not, which could take years for it to be outdated. Depending on the situation a company could have just bought a system, but a newer system was released and is less expensive.

    Log in to Reply
    • Edge Kroll says

      January 23, 2024 at 10:21 pm

      I think it is also important to take into consideration the potential risks that could come with using an outdated system. Which could include things like security vulnerabilities, compatibility issues when using newer technologies, or reduced performance as systems age.

      Log in to Reply
  7. Bo Wang says

    January 21, 2024 at 9:39 pm

    What I learned about risk management is the control of the cost of risk. In the case of risk mitigation, cost is one of the factors that must be considered, and some calculations can be made to determine the expected losses faced by the corresponding risks, and the amount that the company will have to pay if these losses are mitigated. In addition, natural and unintentional human error is not taken into account in decision making because there is no associated cost to consider.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      January 21, 2024 at 10:33 pm

      Considering the costs of controls is a significant aspect of risk mitigation because of the constraint on the organisational budget hence, the allocation of resources needs to be justified by the documentation of the system security plan.

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in