Information Technology Security Risk Assessment A Complete Guide - 2020 Edition. Gerardus Blokdyk
Чтение книги онлайн.

Читать онлайн книгу Information Technology Security Risk Assessment A Complete Guide - 2020 Edition - Gerardus Blokdyk страница 9

СКАЧАТЬ Score

      121. How would you define the culture at your organization, how susceptible is it to Information technology security risk assessment changes?

      <--- Score

      122. How do you manage unclear Information technology security risk assessment requirements?

      <--- Score

      123. What key stakeholder process output measure(s) does Information technology security risk assessment leverage and how?

      <--- Score

      124. What happens if Information technology security risk assessment’s scope changes?

      <--- Score

      125. Are roles and responsibilities formally defined?

      <--- Score

      126. What information should you gather?

      <--- Score

      127. What scope do you want your strategy to cover?

      <--- Score

      128. When is/was the Information technology security risk assessment start date?

      <--- Score

      129. Where can you gather more information?

      <--- Score

      130. How do you gather Information technology security risk assessment requirements?

      <--- Score

      131. Is the work to date meeting requirements?

      <--- Score

      132. What is a worst-case scenario for losses?

      <--- Score

      133. What baselines are required to be defined and managed?

      <--- Score

      134. Are required metrics defined, what are they?

      <--- Score

      Add up total points for this section: _____ = Total points for this section

      Divided by: ______ (number of statements answered) = ______ Average score for this section

      Transfer your score to the Information technology security risk assessment Index at the beginning of the Self-Assessment.

      CRITERION #3: MEASURE:

      INTENT: Gather the correct data. Measure the current performance and evolution of the situation.

      In my belief, the answer to this question is clearly defined:

      5 Strongly Agree

      4 Agree

      3 Neutral

      2 Disagree

      1 Strongly Disagree

      1. Has a cost center been established?

      <--- Score

      2. What is the total fixed cost?

      <--- Score

      3. Are the Information technology security risk assessment benefits worth its costs?

      <--- Score

      4. What potential environmental factors impact the Information technology security risk assessment effort?

      <--- Score

      5. How are costs allocated?

      <--- Score

      6. What are the uncertainties surrounding estimates of impact?

      <--- Score

      7. Are the measurements objective?

      <--- Score

      8. What is your decision requirements diagram?

      <--- Score

      9. What causes investor action?

      <--- Score

      10. What users will be impacted?

      <--- Score

      11. How do you control the overall costs of your work processes?

      <--- Score

      12. How do you aggregate measures across priorities?

      <--- Score

      13. Did you tackle the cause or the symptom?

      <--- Score

      14. The approach of traditional Information technology security risk assessment works for detail complexity but is focused on a systematic approach rather than an understanding of the nature of systems themselves, what approach will permit your organization to deal with the kind of unpredictable emergent behaviors that dynamic complexity can introduce?

      <--- Score

      15. How do you verify and validate the Information technology security risk assessment data?

      <--- Score

      16. What does verifying compliance entail?

      <--- Score

      17. How will measures be used to manage and adapt?

      <--- Score

      18. How will success or failure be measured?

      <--- Score

      19. What would it cost to replace your technology?

      <--- Score

      20. Have you included everything in your Information technology security risk assessment cost models?

      <--- Score

      21. Who pays the cost?

      <--- Score

      22. How will the Information technology security risk assessment data be analyzed?

      <--- Score

      23. What are you verifying?

      <--- Score

      24. Which costs should be taken into account?

      <--- Score

      25. What are the costs of delaying Information technology security СКАЧАТЬ