Sara - Unit-3
Sara - Unit-3
SECURITY PLANNING
Security planning is a critical process for individuals, organizations, and governments to protect
assets, data, and individuals from various threats and risks. It involves assessing potential
vulnerabilities, developing strategies to mitigate these risks, and implementing measures to
safeguard against security breaches. Here are the key steps in security planning:
1. Risk Assessment:
Identify potential security threats and vulnerabilities.
Evaluate the likelihood and potential impact of each threat.
Prioritize threats based on their severity and potential consequences.
2. Set Objectives:
Define clear security objectives and goals.
Ensure alignment with the organization's mission and values.
4. Security Awareness:
Educate employees and stakeholders about security risks and best practices.
Conduct training and awareness programs to ensure everyone is informed.
5. Access Control:
Implement access control mechanisms to restrict unauthorized access to systems,
data, and physical assets.
Use authentication methods, such as passwords, biometrics, or smart cards.
6. Data Protection:
Encrypt sensitive data both in transit and at rest.
Establish data retention and disposal policies.
7. Physical Security:
Secure physical premises with surveillance, alarms, access controls, and security
1|Page
personnel.
Protect sensitive equipment and assets from theft or damage.
8. Network Security:
Implement firewalls, intrusion detection systems, and intrusion prevention systems.
Regularly update and patch software and hardware to address vulnerabilities.
9. Incident Response:
Develop an incident response plan to address security breaches or emergencies.
Assign roles and responsibilities for handling security incidents.
Security planning is an ongoing process, and it requires regular review and adaptation to stay
ahead of emerging threats. It's important to involve relevant stakeholders, seek expert advice,
and stay informed about the latest security trends and best practices.
Policy mechanisms refer to the various methods, tools, and strategies that governments and
organizations use to implement, regulate, and enforce policies.
Directives and procedures for policy mechanisms are essential for guiding
decision-making, ensuring compliance with regulations, and achieving specific
goals within an organization or government
These mechanisms help establish a framework for consistent and effective policy
implementation. Here is an outline of directives and procedures commonly used in
policy mechanisms:
2) Policy Development:
● Establish a process for creating and updating policies.
● Identify responsible individuals or committees for policy development.
● Set a timeline for policy development and revision.
3) Policy Authorization:
● Clearly define the authority responsible for approving policies.
● Specify the criteria and conditions under which a policy can be authorized.
2|Page
4) Policy Communication:
● Outline methods for communicating policies to relevant stakeholders.
● Ensure policies are easily accessible and understandable.
5) Policy Implementation:
● Define the steps and actions required to implement the policy.
● Identify responsible parties and their roles in the implementation process.
● Set deadlines and milestones for policy implementation.
3|Page
ramifications, such as a significant financial burden or even the closure of your
business.
To reduce risk, an organization needs to apply resources to minimize, monitor and
control the impact of negative events while maximizing positive events.
A consistent, systemic and integrated approach to risk management can help
determine how best to identify, manage and mitigate significant risks.
Risk identification,
Risk analysis and assessment, and
Risk mitigation and monitoring.
IDENTIFYING RISKS
For example, risk identification may include assessing IT security threats such as
malware and ransomware, accidents, natural disasters and other potentially
harmful events that could disrupt business operations.
Risk analysis involves establishing the probability that a risk event might occur
and the potential outcome of each event.
Risk evaluation compares the magnitude of each risk and ranks them according to
prominence and consequence
Risk mitigation refers to the process of planning and developing methods and
options to reduce threats to project objectives.
A project team might implement risk mitigation strategies to identify, monitor
and evaluate risks and consequences inherent to completing a specific project,
4|Page
such as new product creation. Risk mitigation also includes the actions put into
place to deal with issues and effects of those issues regarding a project.
Risk management is a nonstop process that adapts and changes over time.
Repeating and continually monitoring the processes can help assure maximum
coverage of known and unknown risks.
1) Risk avoidance:
Avoidance is a method for mitigating risk by not participating in activities that
may negatively affect the organization. Not making an investment or starting a product
line are examples of such activities as they avoid the risk of loss
2) Risk reduction
This method of risk management attempts to minimize the loss, rather than
completely eliminate it. While accepting the risk, it stays focused on keeping the loss
contained and preventing it from spreading.
3) Risk sharing
● When risks are shared, the possibility of loss is transferred from the individual to
the group.
● A corporation is a good example of risk sharing — a number of investors pool
their capital and each only bears a portion of the risk that the enterprise may fail.
4) Transferring risk
● Contractually transferring a risk to a third-party, such as, insurance to cover
possible property damage or injury shifts the risks associated with the property
from the owner to the insurance company.
5|Page
A recent external risk that initially manifested itself as a supply chain issue at
many companies -- the COVID-19 pandemic -- quickly evolved into an existential
threat, affecting the health and safety of employees, the means of doing business,
the ability to interact with customers and corporate reputations.
Businesses made rapid adjustments to the threats posed by the pandemic. But,
going forward, they are grappling with novel risks, including the ongoing issue of
how or whether to bring employees back to the office, what can be done to make
supply chains less vulnerable, inflation and the business and economic effects of
the war in Ukraine.
In many companies, business executives and the board of directors are taking a
fresh look at their risk management programs. Organizations are reassessing
their risk exposure, examining risk processes and reconsidering who should be
involved in risk management.
Traditional risk management often gets a bad rap these days compared to enterprise risk
management. Both approaches aim to mitigate risks that could harm organizations. Both
buy insurance to protect against a range of risks -- from losses due to fire and theft
to cyber liability. Both adhere to guidance provided by the major standards bodies. But
traditional risk management, experts argue, lacks the mindset and mechanisms required
to understand risk as an integral part of enterprise strategy and performance.
For many companies, "risk is a dirty four-letter word -- and that's unfortunate," said
Forrester's Valente. "In ERM, risk is looked at as a strategic enabler versus the cost of
doing business."
"Siloed" vs. holistic is one of the big distinctions between the two approaches, according
to Shinkman. In traditional risk management programs, for example, risk has typically
been the job of the business leaders in charge of the units where the risk resides. For
example, the CIO or CTO is responsible for IT risk, the CFO is responsible for financial
risk, the COO for operational risk and so on. Departments and business units might have
sophisticated systems in place to manage their various types of risks, Shinkman
explained, but the company can still run into trouble by failing to see the relationships
among risks or their cumulative impact on operations. Traditional risk management also
tends to be reactive rather than proactive.
6|Page
"The pandemic is a great example of a risk issue that is very easy to ignore if you don't
take a holistic, long-term strategic view of the kinds of risks that could hurt you as a
company," Shinkman said. "A lot of companies will look back and say, 'You know, we
should have known about this, or at least thought about the financial implications of
something like this before it happened.'"
In defining the chief risk officer role, Forrester makes a distinction between the
"transactional CROs" typically found in traditional risk management programs and the
"transformational CROs" who take an ERM approach. The former work at companies that
see risk as a cost center and risk management as an insurance policy, according to
Forrester. Transformational CROs, in the Forrester lexicon, are "customer-obsessed,"
Valente said. They focus on their company's brand reputation, understand the horizontal
nature of risk and define ERM as the "proper amount of risk needed to grow," as Valente
put it.
Risk averse is another trait of organizations with traditional risk management programs.
But as Valente noted, companies that define themselves as risk averse with a low risk
appetite are sometimes off the mark in their risk assessments.
The term risk analysis refers to the assessment process that identifies the
potential for any adverse events that may negatively affect organizations and the
environment.
Risk analysis is commonly performed by corporations (banks, construction
groups, health care, etc.), governments.
Conducting a risk analysis can help organizations determine whether they should
undertake a project or approve a financial application, and what actions they may
need to take to protect their interests.
Risk analysts often work in with forecasting professionals to minimize future
negative unforeseen effects.
7|Page
Types of Risk Analysis
● Risk-Benefits
● Needs Assessment
● Business Impact Analysis
● Root Cause Analysis
RISK BENEFITS
The potential benefits may cause other, new types of potential expenses to occur.
In a similar manner, a risk-benefit analysis compares potential benefits with
associated potential risks. Benefits may be ranked and evaluated based on their
likelihood of success or the projected impact the benefits may have
NEEDS ASSESSMENT
A needs risk analysis is an analysis of the current state of a company. Often, a
company will undergo a needs assessment to better understand a need or gap that
is already known.
Alternatively, a needs assessment may be done if management is not aware of
gaps or deficiencies. This analysis lets the company know where they need to
spending more resources in.
8|Page
Root cause analysis (RCA) is the process of discovering the root causes of
problems in order to identify appropriate solutions.
a root cause analysis is performed because something is happening that shouldn't
be.
This type of risk analysis strives to identify and eliminate processes that cause
issues. Whereas other types of risk analysis often forecast what needs to be done
or what could be getting done, a root cause analysis aims to identify the impact of
things that have already happened or continue to happen.
The first step in many types of risk analysis to is to make a list of potential risks
you may encounter.
These may be internal threats that arise from within a company, though most risks
will be external that occur from outside forces.
It is important to incorporate many different members of a company for this
brainstorming session as different departments may have different perspectives
and inputs.
Consider the example of a product recall of defective products after they have
been shipped. A company may not know how many units were defective, so it may
project different scenarios where either a partial or full product recall is
performed. The company may also run various scenarios on how to resolve the
issue with customers (i.e. a low, medium, or high engagement solution.
9|Page
Step #3: Estimate Impact
● Most often, the goal of a risk analysis is to better understand how risk will
financially impact a company. This is usually calculated as the risk value, which is
the probability of an event happening multiplied by the cost of the event.
After management has digested the information, it is time to put a plan in action.
Sometimes, the plan is to do nothing; in risk acceptance strategies, a company has
decided it will not change course as it makes most financial sense to simply live
with the risk of something happening and dealing with it after it occurs. In other
cases, management may want to reduce or eliminate the risk.
Risk analysis allows companies to make informed decisions and plan for
contingencies before bad things happen. Not all risks may materialize, but it is
important for a company to understand what may occur so it can at least choose to
make plans ahead of time to avoid potential losses.
Risk analysis also helps quantify risk, as management may not know the financial
impact of something happening. In some cases, the information may help companies
10 | P a g e
avoid unprofitable projects. In other cases, the information may help put plans in
motion that reduce the likelihood of something happen that would have caused
financial stress on a company.
Risk analysis may detect early warning signs of potentially catastrophic events. For
example, risk analysis may identify that customer information is not being
adequately secured. In this example, risk analysis can lead to better processes,
stronger documentation, more robust internal controls, and risk mitigation.
Risk is a probabilistic measure and so can never tell you for sure what your precise
risk exposure is at a given time, only what the distribution of possible losses is likely
to be if and when they occur. There are also no standard methods for calculating and
analyzing risk, and even VaR can have several different ways of approaching the task.
Risk is often assumed to occur using normal distribution probabilities, which in
reality rarely occur and cannot account for extreme or "black swan" events.
The financial crisis of 2008, for example, exposed these problems as relatively benign
VaR calculations that greatly understated the potential occurrence of risk events
posed by portfolios of subprime mortgages.
11 | P a g e
3.7 VULNERABILITY ASSESSMENT COMPONENTS
Vulnerability assessments are most effective when they are incorporated into an existing
planning or management process. Indeed, they follow many of the same phases of
standard resource management planning efforts (e.g., scoping, stakeholder engagement,
implementation, monitoring, adaptive management).
12 | P a g e
1. Define assessment purpose and scope
magnitude and rate of ecosystem changes (e.g., from climate data and local
knowledge)
existing local stressors on targets, ecosystem health, and ecosystem services
differences in how humans may be affected by climate impacts (e.g., based on
occupation, gender, health, education, age)
Identifies the key factors affecting adaptive capacity and assesses the ability of
communities and ecosystems to cope with and respond to the combined effects of local
stressors and climate change and variability. This may include:
effectiveness of and access to social networks (e.g., women’s groups, church
groups, youth groups)
local knowledge and practices to cope with climate events and impacts
community awareness of climate change
ability to plan, learn, and reorganize in response to hazards/climate events
access to financial and material resources and information to cope with risk
13 | P a g e
vulnerability of current socioeconomic/environmental conditions to future
climate change
uncertainty of climate change and associated impacts
Involves the development and prioritization of adaptation strategies and policies that
reduce exposure or sensitivity and/or build adaptive capacity. This may include:
adapting current management strategies or developing new ones, to more
comprehensively address vulnerabilities to climate impacts
prioritization of adaptation strategies based on criteria (e.g., community
acceptability, costs/benefits, possible adverse effects, effectiveness, feasibility, and
potential impacts)
barriers to adaptation and ways to overcome barriers
Risk evaluation is the process of assessing and analyzing potential risks in order to make
informed decisions about how to manage or mitigate them. It is a fundamental
component of risk management and is used in various fields, including business, finance,
project management, and safety. The primary steps involved in risk evaluation include:
1. Identification of Risks: The first step is to identify potential risks. This can be done
14 | P a g e
through brainstorming, historical data analysis, expert opinions, and other
methods. Risks can be categorized as internal (e.g., operational, financial) or
external (e.g., market, environmental).
2. Risk Assessment: Once risks are identified, they need to be assessed. This involves
estimating the likelihood of each risk occurring and the potential impact or
consequences if it does. Various tools and techniques, such as risk matrices and
probability assessments, can be used in this phase.
3. Risk Prioritization: Not all risks are of equal importance. Prioritization helps focus
resources and attention on the most significant risks. This can be done by
assigning a risk score based on likelihood and impact or by using other criteria
that are relevant to the specific context.
4. Risk Mitigation and Management: After prioritization, organizations or individuals
can decide on strategies for managing or mitigating the identified risks. This might
involve risk avoidance, risk reduction, risk sharing (e.g., insurance), or risk
acceptance.
5. Monitoring and Review: Risk evaluation is an ongoing process. Regular monitoring
is crucial to ensure that risks are managed effectively and to identify new risks
that may emerge. Continuous review and adjustment of risk management
strategies are essential.
6. Reporting and Communication: Effective communication of risks and risk
management strategies is crucial, both within an organization and, in some cases,
to external stakeholders. Transparency and clear reporting can help in decision-
making and gaining support for risk management efforts.
But we all like to think that all of our employees will be trustworthy, but this is not
always the case. There have been many instances in which an employee has been
dishonest about their job history, qualifications or even criminal history. A dishonest
employee could be unqualified for the position, possibly endangering others on the job.
Or they might be a fraud risk, willing to bend the truth in other ways in order to enrich or
advance themselves on your dime. No organisation can afford to have employees or staff
who aren’t what they claim to be. Even a seemingly innocent embellishment can indicate
more background problems under the surface, and the potential for future problems
down the road so remember, trust your employees but, verify them too.
15 | P a g e
ROLES AND RESPONSIBILITIES
16 | P a g e
17 | P a g e
3.9 CONTINGENCY PLANS
Contingency plans are a crucial part of risk management. They are designed to help
organizations prepare for and respond to unexpected events that could disrupt
operations or damage the organization's assets. Here are the key components of a
contingency plan in risk management:
1. Risk Assessment:
Identify and assess potential risks and threats to the organization. This
includes natural disasters, economic downturns, cybersecurity breaches,
and other unforeseen events.
Define the objectives and scope of the contingency plan. What are the
specific goals and the areas of the organization it will cover? This could be a
plan for the entire organization or specific departments.
18 | P a g e
3. Risk Analysis:
4. Response Strategies:
Develop strategies for responding to each identified risk. This may involve
risk mitigation, risk avoidance, risk transfer (e.g., insurance), or risk
acceptance. For some risks, you may need a combination of these
strategies.
6. Communication Plan:
7. Resource Allocation:
8. Recovery Procedures:
19 | P a g e
10. Documentation:
Purpose
All electronic information considered of institutional value should be copied onto secure
storage media on a regular basis (i.e., backed up), for disaster recovery and business
resumption. This policy outlines the minimum requirements for the creation and
retention of backups. Special backup needs, identified through technical risk analysis that
exceeds these requirements, should be accommodated on an individual basis.
Scope
Data custodians are responsible for providing adequate backups to ensure the recovery
of data and systems in the event of failure. Backup provisions allow business processes to
be resumed in a reasonable amount of time with minimal loss of data. Since hardware
and software failures can take many forms, and may occur over time, multiple
generations of institutional data backups need to be maintained.
Definitions
University Critical Data is data that if it were deemed unavailable to the University will
have an immediate (within 24 hours) critical impact on the University.
Data Owners are the department managers, members of the top management team, or
their delegates who bear responsibility for the acquisition, development, and
maintenance of production applications that process University information. See
the Information Security Roles and Responsibilities for more information.
Standard
20 | P a g e
Backup and Recovery processes commensurate with legislative and business
requirements must be developed, maintained and regularly tested, to ensure continued
business operation and access to data and information within the required timeframe,
should a risk event occur.
In addition to regular backup processes, backups will be performed before and after
major technical or business related changes to a system or application.
Documentation
For all departmental information assets, documented procedures must exist for the
backup and recovery processes and these documents must be readily accessible. Backup
and recovery operations and the specified period of maximum acceptable outage must be
documented for all systems.
The individual or group responsible for ensuring that the backup and recovery
occurs
21 | P a g e
Backup retention period (as prescribed by the University Data Retention Policy)
Testing process
Backup media
Protection mechanisms and access controls for backup media must be commensurate
with the security requirements and criticality of the information stored in the backup.
Backup media must be stored and transported in an appropriate, safe and secure manner
and access to backup media must be restricted to only authorized personnel.
Off-site storage
Based on backup requirements and backup cycles, at least one instance of a backup
within a cycle must be stored off-site (physically separate from the data or system being
backed up) or geographically separate, as determined by a risk assessment.
Backup media stored off site must be stored in a secure location with environmental
controls (if available) and appropriate access controls commensurate with the security
requirements and criticality of the information stored in the backup.
Back-up tapes will be stored off-site on a basis that is determined by the risk assessment.
Obsolete backup media must be disposed of in a safe and secure manner, in accordance
with University policy. Backup media to be disposed of must be rendered unreadable
through an appropriate means and an audit trail of disposal of backup media must be
maintained. See Data Sanitization Standard for further guidance.
22 | P a g e
incidents such as natural disasters, power outages, cyber attacks and any other
disruptive events.
A DR plan is more focused than a business continuity plan and does not
necessarily cover all contingencies for business processes, assets, human
resources and business partners.
Disruptions can include power outages, telephone system outages, temporary loss
of access to a facility due to bomb threats, a "possible fire" or a low-impact non-
destructive fire, flood or other event. A DR plan should be organized by type of
disaster and location. It must contain scripts (instructions) that can be
implemented by anyone.
KEY REASONS
The compelling need to drive superior customer experience and business outcome is
fueling the growing trend of hybrid multicloud adoption by enterprises. Hybrid
multicloud, however, creates infrastructure complexity and potential risks that require
specialized skills and tools to manage. As a result of the complexity, organizations are
suffering frequent outages and system breakdown, coupled with cyber-attacks, lack of
skills, and supplier failure. The business impact of outages or unplanned downtime is
extremely high, more so in a hybrid multicloud environment. Delivering resiliency in a
hybrid multicloud requires a disaster recovery plan that includes specialized skills, an
integrated strategy and advanced technologies, including orchestration for data
protection and recovery. Organizations must have comprehensive enterprise resiliency
with orchestration technology to help mitigate business continuity risks in hybrid
multicloud, enabling businesses to achieve their digital transformation goals.
Other key reasons why a business would want a detailed and tested disaster recovery
plan include:
23 | P a g e
To minimize interruptions to normal operations.
To limit the extent of disruption and damage.
To minimize the economic impact of the interruption.
To establish alternative means of operation in advance.
To train personnel with emergency procedures.
To provide for smooth and rapid restoration of service.
To meet today's expectation of continuous business operations, organizations must be
able to restore critical systems within minutes, if not seconds of a disruption.
Many organizations struggle to evolve their DR plan strategies quickly enough to address
today’s hybrid-IT environments and complex business operations. In an always-on, 24/7-
world, an organization can gain a competitive advantage –or lose market share –
depending on how quickly it can recover from a disaster and recover core business
services.
Some organizations use external disaster recovery and business continuity consulting
services to address a company’s needs for assessments, planning and design,
implementation, testing and full resiliency program management.
There are proactive services to help businesses overcome disruptions with flexible, cost-
effective IT DR solutions.
With the growth of cyber attacks, companies are moving from a traditional/manual
recovery approach to an automated and software-defined resiliency approach. Other
companies turn to cloud-based backup services provide continuous replication of critical
applications, infrastructure, data and systems for rapid recovery after an IT outage. There
are also virtual server options to protect critical servers in real-time. This enables rapid
recovery of your applications to keep businesses operational during periods of
maintenance or unexpected downtime.
In today’s always-on world, your business can’t afford downtime, which can result in
revenue loss, reputational damage, and regulatory penalties. Learn how Kyndryl can help
transform your IT recovery management through automation to simplify disaster
recovery process, increase workflow efficiency, and reduce risk, cost, and system testing
time.
24 | P a g e
KEY STEPS OF A DISASTER RECOVERY PLAN
25 | P a g e
3.11 DEVELOPMENT OF PROCEDURES FOR OFFSITE PROCESSING IN RISK
MANAGEMENT
1. Risk Assessment:
Identify the potential risks that could disrupt your primary facility, such as
natural disasters, power outages, cyberattacks, and pandemics.
Assess the impact of these risks on your business operations, including data
loss, revenue, and customer satisfaction.
Identify the resources and data necessary for these processes to function.
26 | P a g e
Create detailed procedures for transitioning to offsite processing during a
disruption.
Include specific steps for data backup, system configuration, and resource
allocation.
Specify how data will be backed up and transferred to the offsite location.
Ensure that backup data is regularly tested for integrity and recoverability.
27 | P a g e
Keep documentation up to date and easily accessible.
Ensure that contracts with service providers and partners outline the terms
and conditions related to offsite processing, including data protection and
recovery obligations.
PHYSICAL HAZARDS:
Injuries during Project operation are typically related to slips, trips, and falls; contact with falling /
moving objects; and lifting / over-exertion. Other injuries may occur due to contact with, or capture in,
moving machinery (e.g. dump trucks, front loaders, forklifts). Activities related to maintenance of
equipment, including mills, mill separators, fans and belt conveyors, represent a significant source of
exposure to physical hazards. Such hazards may include the following: Falling / impact with objects
Transportation Contact with allergic substances.
Any person working on equipment with moving parts will personally ensure the equipment is
de-energized, isolated and locked/tagged out.
28 | P a g e
Any person working from a position with the potential risk for a fall from height will use fall
protection. Any person doing flame welding, cutting or brazing in the proximity of any
flammable material will use PPE.
Prescribed PPE will be provided to all workers exposed to open processes or systems.
In case of any accident immediate & proper medical care will be provided at the plant site.
29 | P a g e
30 | P a g e
31 | P a g e
32 | P a g e
33 | P a g e