SlideShare a Scribd company logo
1 of 15
CHAPTER 1
Risk Management Fundamentals
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com.
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Learning Objective(s) and Key Concepts
Describe the components of and approaches to effective risk
management in an organization.
Risk and its relationship to threat, vulnerability, and asset loss
Classifying business risk in relation to the seven domains of a
typical IT infrastructure
Risk identification techniques
Risk management process
Strategies for handling risk
Learning Objective(s)
Key Concepts
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
What Is Risk?
Risk: The likelihood that a loss will occur; losses occur when a
threat exposes a vulnerability that could harm an asset
Threat: Any activity that represents a possible danger
Vulnerability: A weakness
Asset: A thing of value worth protecting
Loss: A loss results in a compromise to business functions or
assets.
Tangible
Intangible
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Risk-Related Concerns for Business
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Compromise of business functions
Compromise of business assets
Driver of business costs
Profitability versus survivability
Threats, Vulnerabilities, Assets, and Impact
Threats can be thought of as attempts to exploit vulnerabilities
that result in the loss of confidentiality, integrity, or availability
of a business asset:
Confidentiality: Preventing unauthorized disclosure of
information
Integrity: Ensuring data or an IT system is not modified or
destroyed
Availability: Ensuring data and services are available when
needed
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Vulnerabilities
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
A vulnerability is a weakness
A loss to an asset occurs only when an attacker is able to
exploit the vulnerability
Vulnerabilities may exist because they’ve never been corrected
Vulnerabilities can also exist if security is weakened either
intentionally or unintentionally
Assets
Tangible value is the actual cost of the asset:
Computer systems—Servers, desktop PCs, and mobile
computers
Network components—Routers, switches, firewalls, and any
other components necessary to keep the network running
Software applications—Any application that can be installed on
a computer system
Data—Includes large-scale databases and the data used and
manipulated by each employee or customer
The intangible value cannot be measured by cost, such as client
confidence or company reputation:
Future lost revenue—Any purchases customers make with
another company are a loss to the company
Cost of gaining the customer—If a company loses a customer,
the company’s investment is lost
Customer influence—Customers commonly share their
experience with others, especially if the experience is
exceptionally positive or negative
Reputation—One customer’s bad experience could potentially
influence other current or potential customers to avoid future
business transactions
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Impact
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Very High
Indicates multiple severe or catastrophic adverse effects
High
Indicates a severe or catastrophic adverse effect
Moderate
Indicates a negligible adverse effect
Low
Very Low
Indicates a serious adverse effect
Indicates a limited adverse effect
Classify Business Risks
Risks posed by people:
Leaders and managers
System administrators
Developer
End user
Risks posed by a lack of process:
Policies
Standards
Guidelines
Risks posed by technology:
User Domain
Workstation Domain
LAN Domain
LAN-to-WAN Domain
WAN Domain
Remote Access Domain
System/Application Domain
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Classify Business Risks (Cont.)
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Seven Domains of a Typical IT Infrastructure
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Risk Identification Techniques
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Identify threats
Identify vulnerabilities
Estimate impact and likelihood of a threat exploiting a
vulnerability
Identifying Threats and VulnerabilitiesComponentType or
SourceThreatsExternal or internal
Natural or man-made
Intentional or accidentalVulnerabilitiesAudits
Certification/accreditation records
System logs
Prior events
Trouble reports
Incident response teams
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Balancing Risk and Cost
Consider the cost to implement a control and the cost of not
implementing the control
Spending money to manage a risk rarely adds profit; important
point is that spending money on risk management can help
ensure a business’s survivability
Cost to manage a risk must be balanced against the impact value
Reasonableness: “Would a reasonable person be expected to
manage this risk?”
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Balancing Risk and Cost (Cont.)Low Impact
(0%—10%)Medium Impact
(11%—50%)High Impact
(51%—100%)High-threat likelihood—100% (1.0)10 × 1 = 10 50
× 1 = 50 100 × 1 = 100Medium-threat likelihood—50% (.50)10
× .50 = 5 50 × .50 = 25 100 × .50 = 50Low-threat likelihood—
10% (.10)10 × .10 = 1 50 × .10 = 5100 × .10 = 10
A threat-likelihood-impact matrix.
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Risk Management Process
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Risk Management
Risk: Probability of loss
Vulnerability: System weakness
Threat: Potential harm
Risk Management Process (Cont.)
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Assess risks
Identify risks to manage
Select controls
Implement and test controls
Evaluate controls
Cost-Benefit Analysis
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Principle of Proportionality
Cost-benefit analysis (CBA)
Cost of control
Projected benefits
The amount spent on controls should be proportional to the risk
Helps determine which controls, or countermeasures, to
implement
Profitability Versus Survivability
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Out-of-pocket costs
Lost opportunity costs
Future costs
Client and stakeholder confidence
Total cost of security
Risk-Handling Strategies
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
Various Techniques of Risk Management
Avoiding
Sharing or transferring
Mitigating
Accepting
Residual Risk
Summary
Risk and its relationship to threat, vulnerability, and asset loss
Classifying business risk in relation to the seven domains of a
typical IT infrastructure
Risk identification techniques
Risk management process
Strategies for handling risk
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
Learning Company. www.jblearning.com
10/8/2020
21
Healthcare Cost and Utilization Project (HCUP)
Virtual Field Trip (1:57):
https://www.youtube.com/watch?v=m2xytHIm3K0
Started in 1988
Our most comprehensive source of hospital care data
Data collected from these types of encounters:
in-patient stays
ambulatory surgery and services visits
emergency department
Includes clinical and nonclinical data (diagnoses and
procedures, discharge status, patient demographics, and
charges) for all patients, regardless of payer (e.g., Medicare,
Medicaid, private insurance, uninsured)
Enables researchers, insurers, policymakers and others to study
health care delivery and patient outcomes over time
Family of databases, software tools and related products
Data is used for research on health policy issues:
cost and quality of health services
medical practice patterns
access to health care programs
outcomes of treatments at the national, State, and local market
levels.
Virtual Field Trip (20:27):
https://www.youtube.com/watch?v=n7aZLAMJDRw
Helpful Resources
Chapter 8: Secondary Data Sources
AHRQ Views: Watch 3 videos on this page!
https://www.ahrq.gov/news/blog/ahrqviews/health-data-
community-datapalooza.html
Review this article: Great explanation of how HCUP collects
data.
https://www.businessinsider.com/most-expensive-health-
conditions-hospital-costs-2018-2
The average hospital stay in the US costs just over $10,700,
based on an analysis of recent data from the Healthcare Cost
and Utilization Project (HCUP).
In total, there were 35.4 million hospital stays with an
aggregate cost of $384.5 billion.
HCUP Infographics!
HCUP Statistical Briefs:
https://www.hcup-us.ahrq.gov/reports/statbriefs/statbriefs.jsp
HCUP Infographics:
https://hcup-us.ahrq.gov/reports/infographics.jsp
More Helpful Resources
Healthcare Cost and Utilization Project:
U.S. Department of Health & Human Services
http://www.ahrq.gov/research/data/hcup/
https://www.hcup-us.ahrq.gov/
Research so that you understand
what the H-CUP program is all about!
Interactive Tutorial:
https://www.hcup-
us.ahrq.gov/HCUP_Overview/HCUP_Overview/index.html
State Information:
https://www.hcup-us.ahrq.gov/partners.jsp
Unit 6 Assignment
Healthcare Cost and Utilization Project:
U.S. Department of Health & Human Services
http://www.ahrq.gov/research/data/hcup/
** https://www.hcup-us.ahrq.gov/ **
Create a 1-page informational flyer for the Healthcare Cost and
Utilization Project.
You should use Microsoft Word or Microsoft Publisher to create
your advertisement. Include the following information:
What is the HCUP Program?
There are several different database tools used in this program.
Name at least 4 database tools and give a summary for each.
Indicate on the advertisement if your state participates in the
HCUP program. If your state does participate in the program,
provide the contact information for the person listed.
Looking Ahead: Unit 6 Assignment
National (Nationwide) Inpatient Sample (NIS):
is the largest publicly available all-payer hospital inpatient care
database in the United States. Researchers and policymakers use
NIS data to identify, track, and analyze trends in health care
utilization, access, charges, quality, and outcomes.
Kids' Inpatient Database (KID):
is composed of hospital inpatient stays for children and is
specifically designed to allow researchers to study a broad
range of conditions and procedures related to children's health.
Researchers and policymakers can use KID data to identify,
track, and analyze health care utilization, access, charges,
quality, and outcomes.
Nationwide Emergency Department Sample (NEDS):
captures information on emergency department (ED) visits that
do not result in an admission as well as ED visits that result in
an admission to the same hospital. The NEDS enables analyses
of ED utilization patterns and supports public health
professionals, administrators, policymakers, and clinicians in
their decision making regarding this critical source of care.
State Emergency Department Databases (SEDD):
are a set of databases that capture discharge information on all
emergency department visits that do not result in an admission.
The SEDD combined with SID discharges that originate in the
emergency department are well suited for research and policy
questions that require complete enumeration of hospital-based
emergency departments within market areas or States.

More Related Content

Similar to CHAPTER 1Risk Management FundamentalsCopyright © 202

Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docxForm Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
alisondakintxt
 
Managing Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxManaging Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docx
jessiehampson
 
V-Empower Services And Solutions
V-Empower Services And SolutionsV-Empower Services And Solutions
V-Empower Services And Solutions
guest609a5ed
 
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxTechnical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
mattinsonjanel
 
COURSE PROJECT2Operating System and Application Security Str.docx
COURSE PROJECT2Operating System and Application Security Str.docxCOURSE PROJECT2Operating System and Application Security Str.docx
COURSE PROJECT2Operating System and Application Security Str.docx
marilucorr
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
Info-Tech Research Group
 

Similar to CHAPTER 1Risk Management FundamentalsCopyright © 202 (20)

Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docxForm Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
 
Managing Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxManaging Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docx
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
V-Empower Services And Solutions
V-Empower Services And SolutionsV-Empower Services And Solutions
V-Empower Services And Solutions
 
V-Empower Services And Solutions
V-Empower Services And SolutionsV-Empower Services And Solutions
V-Empower Services And Solutions
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
 
Pragmatic Device Risk Management
Pragmatic Device Risk Management Pragmatic Device Risk Management
Pragmatic Device Risk Management
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
 
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability Management
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disney
 
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous MonitoringTrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
 
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxTechnical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
COURSE PROJECT2Operating System and Application Security Str.docx
COURSE PROJECT2Operating System and Application Security Str.docxCOURSE PROJECT2Operating System and Application Security Str.docx
COURSE PROJECT2Operating System and Application Security Str.docx
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
 
Qatar Proposal
Qatar ProposalQatar Proposal
Qatar Proposal
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 

More from EstelaJeffery653

Individual ProjectThe Post-Watergate EraWed, 3817Numeric.docx
Individual ProjectThe Post-Watergate EraWed, 3817Numeric.docxIndividual ProjectThe Post-Watergate EraWed, 3817Numeric.docx
Individual ProjectThe Post-Watergate EraWed, 3817Numeric.docx
EstelaJeffery653
 
Individual ProjectArticulating the Integrated PlanWed, 31.docx
Individual ProjectArticulating the Integrated PlanWed, 31.docxIndividual ProjectArticulating the Integrated PlanWed, 31.docx
Individual ProjectArticulating the Integrated PlanWed, 31.docx
EstelaJeffery653
 
Individual Implementation Strategiesno new messagesObjectives.docx
Individual Implementation Strategiesno new messagesObjectives.docxIndividual Implementation Strategiesno new messagesObjectives.docx
Individual Implementation Strategiesno new messagesObjectives.docx
EstelaJeffery653
 
Individual Cultural Communication Written Assignment  (Worth 20 of .docx
Individual Cultural Communication Written Assignment  (Worth 20 of .docxIndividual Cultural Communication Written Assignment  (Worth 20 of .docx
Individual Cultural Communication Written Assignment  (Worth 20 of .docx
EstelaJeffery653
 
Individual Communicating to Management Concerning Information Syste.docx
Individual Communicating to Management Concerning Information Syste.docxIndividual Communicating to Management Concerning Information Syste.docx
Individual Communicating to Management Concerning Information Syste.docx
EstelaJeffery653
 

More from EstelaJeffery653 (20)

Individual ProjectMedical TechnologyWed, 9617Num.docx
Individual ProjectMedical TechnologyWed, 9617Num.docxIndividual ProjectMedical TechnologyWed, 9617Num.docx
Individual ProjectMedical TechnologyWed, 9617Num.docx
 
Individual ProjectThe Post-Watergate EraWed, 3817Numeric.docx
Individual ProjectThe Post-Watergate EraWed, 3817Numeric.docxIndividual ProjectThe Post-Watergate EraWed, 3817Numeric.docx
Individual ProjectThe Post-Watergate EraWed, 3817Numeric.docx
 
Individual ProjectArticulating the Integrated PlanWed, 31.docx
Individual ProjectArticulating the Integrated PlanWed, 31.docxIndividual ProjectArticulating the Integrated PlanWed, 31.docx
Individual ProjectArticulating the Integrated PlanWed, 31.docx
 
Individual Multilingualism Guidelines1)Where did the a.docx
Individual Multilingualism Guidelines1)Where did the a.docxIndividual Multilingualism Guidelines1)Where did the a.docx
Individual Multilingualism Guidelines1)Where did the a.docx
 
Individual Implementation Strategiesno new messagesObjectives.docx
Individual Implementation Strategiesno new messagesObjectives.docxIndividual Implementation Strategiesno new messagesObjectives.docx
Individual Implementation Strategiesno new messagesObjectives.docx
 
Individual Refine and Finalize WebsiteDueJul 02View m.docx
Individual Refine and Finalize WebsiteDueJul 02View m.docxIndividual Refine and Finalize WebsiteDueJul 02View m.docx
Individual Refine and Finalize WebsiteDueJul 02View m.docx
 
Individual Cultural Communication Written Assignment  (Worth 20 of .docx
Individual Cultural Communication Written Assignment  (Worth 20 of .docxIndividual Cultural Communication Written Assignment  (Worth 20 of .docx
Individual Cultural Communication Written Assignment  (Worth 20 of .docx
 
Individual ProjectThe Basic Marketing PlanWed, 3117N.docx
Individual ProjectThe Basic Marketing PlanWed, 3117N.docxIndividual ProjectThe Basic Marketing PlanWed, 3117N.docx
Individual ProjectThe Basic Marketing PlanWed, 3117N.docx
 
Individual ProjectFinancial Procedures in a Health Care Organiza.docx
Individual ProjectFinancial Procedures in a Health Care Organiza.docxIndividual ProjectFinancial Procedures in a Health Care Organiza.docx
Individual ProjectFinancial Procedures in a Health Care Organiza.docx
 
Individual Expanded Website PlanView more »Expand view.docx
Individual Expanded Website PlanView more  »Expand view.docxIndividual Expanded Website PlanView more  »Expand view.docx
Individual Expanded Website PlanView more »Expand view.docx
 
Individual Expanded Website PlanDueJul 02View more .docx
Individual Expanded Website PlanDueJul 02View more .docxIndividual Expanded Website PlanDueJul 02View more .docx
Individual Expanded Website PlanDueJul 02View more .docx
 
Individual Communicating to Management Concerning Information Syste.docx
Individual Communicating to Management Concerning Information Syste.docxIndividual Communicating to Management Concerning Information Syste.docx
Individual Communicating to Management Concerning Information Syste.docx
 
Individual Case Analysis-MatavIn max 4 single-spaced total pag.docx
Individual Case Analysis-MatavIn max 4 single-spaced total pag.docxIndividual Case Analysis-MatavIn max 4 single-spaced total pag.docx
Individual Case Analysis-MatavIn max 4 single-spaced total pag.docx
 
Individual Assignment Report Format• Report should contain not m.docx
Individual Assignment Report Format• Report should contain not m.docxIndividual Assignment Report Format• Report should contain not m.docx
Individual Assignment Report Format• Report should contain not m.docx
 
Include LOCO api that allows user to key in an address and get the d.docx
Include LOCO api that allows user to key in an address and get the d.docxInclude LOCO api that allows user to key in an address and get the d.docx
Include LOCO api that allows user to key in an address and get the d.docx
 
Include the title, the name of the composer (if known) and of the .docx
Include the title, the name of the composer (if known) and of the .docxInclude the title, the name of the composer (if known) and of the .docx
Include the title, the name of the composer (if known) and of the .docx
 
include as many events as possible to support your explanation of th.docx
include as many events as possible to support your explanation of th.docxinclude as many events as possible to support your explanation of th.docx
include as many events as possible to support your explanation of th.docx
 
Incorporate the suggestions that were provided by your fellow projec.docx
Incorporate the suggestions that were provided by your fellow projec.docxIncorporate the suggestions that were provided by your fellow projec.docx
Incorporate the suggestions that were provided by your fellow projec.docx
 
inal ProjectDUE Jun 25, 2017 1155 PMGrade DetailsGradeNA.docx
inal ProjectDUE Jun 25, 2017 1155 PMGrade DetailsGradeNA.docxinal ProjectDUE Jun 25, 2017 1155 PMGrade DetailsGradeNA.docx
inal ProjectDUE Jun 25, 2017 1155 PMGrade DetailsGradeNA.docx
 
include 1page proposal- short introduction to research paper and yo.docx
include 1page proposal- short introduction to research paper and yo.docxinclude 1page proposal- short introduction to research paper and yo.docx
include 1page proposal- short introduction to research paper and yo.docx
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 

Recently uploaded (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

CHAPTER 1Risk Management FundamentalsCopyright © 202

  • 1. CHAPTER 1 Risk Management Fundamentals Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com. Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Learning Objective(s) and Key Concepts Describe the components of and approaches to effective risk management in an organization. Risk and its relationship to threat, vulnerability, and asset loss Classifying business risk in relation to the seven domains of a typical IT infrastructure Risk identification techniques Risk management process Strategies for handling risk Learning Objective(s) Key Concepts Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com What Is Risk? Risk: The likelihood that a loss will occur; losses occur when a threat exposes a vulnerability that could harm an asset Threat: Any activity that represents a possible danger
  • 2. Vulnerability: A weakness Asset: A thing of value worth protecting Loss: A loss results in a compromise to business functions or assets. Tangible Intangible Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Risk-Related Concerns for Business Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Compromise of business functions Compromise of business assets Driver of business costs Profitability versus survivability Threats, Vulnerabilities, Assets, and Impact Threats can be thought of as attempts to exploit vulnerabilities that result in the loss of confidentiality, integrity, or availability of a business asset: Confidentiality: Preventing unauthorized disclosure of
  • 3. information Integrity: Ensuring data or an IT system is not modified or destroyed Availability: Ensuring data and services are available when needed Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Vulnerabilities Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com A vulnerability is a weakness A loss to an asset occurs only when an attacker is able to exploit the vulnerability Vulnerabilities may exist because they’ve never been corrected Vulnerabilities can also exist if security is weakened either intentionally or unintentionally Assets Tangible value is the actual cost of the asset: Computer systems—Servers, desktop PCs, and mobile computers
  • 4. Network components—Routers, switches, firewalls, and any other components necessary to keep the network running Software applications—Any application that can be installed on a computer system Data—Includes large-scale databases and the data used and manipulated by each employee or customer The intangible value cannot be measured by cost, such as client confidence or company reputation: Future lost revenue—Any purchases customers make with another company are a loss to the company Cost of gaining the customer—If a company loses a customer, the company’s investment is lost Customer influence—Customers commonly share their experience with others, especially if the experience is exceptionally positive or negative Reputation—One customer’s bad experience could potentially influence other current or potential customers to avoid future business transactions Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Impact Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Very High
  • 5. Indicates multiple severe or catastrophic adverse effects High Indicates a severe or catastrophic adverse effect Moderate Indicates a negligible adverse effect Low Very Low Indicates a serious adverse effect Indicates a limited adverse effect Classify Business Risks Risks posed by people: Leaders and managers System administrators Developer End user Risks posed by a lack of process: Policies
  • 6. Standards Guidelines Risks posed by technology: User Domain Workstation Domain LAN Domain LAN-to-WAN Domain WAN Domain Remote Access Domain System/Application Domain Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Classify Business Risks (Cont.) Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Seven Domains of a Typical IT Infrastructure Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Risk Identification Techniques Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Identify threats
  • 7. Identify vulnerabilities Estimate impact and likelihood of a threat exploiting a vulnerability Identifying Threats and VulnerabilitiesComponentType or SourceThreatsExternal or internal Natural or man-made Intentional or accidentalVulnerabilitiesAudits Certification/accreditation records System logs Prior events Trouble reports Incident response teams Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Balancing Risk and Cost Consider the cost to implement a control and the cost of not implementing the control Spending money to manage a risk rarely adds profit; important point is that spending money on risk management can help ensure a business’s survivability Cost to manage a risk must be balanced against the impact value Reasonableness: “Would a reasonable person be expected to manage this risk?” Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
  • 8. Learning Company. www.jblearning.com Balancing Risk and Cost (Cont.)Low Impact (0%—10%)Medium Impact (11%—50%)High Impact (51%—100%)High-threat likelihood—100% (1.0)10 × 1 = 10 50 × 1 = 50 100 × 1 = 100Medium-threat likelihood—50% (.50)10 × .50 = 5 50 × .50 = 25 100 × .50 = 50Low-threat likelihood— 10% (.10)10 × .10 = 1 50 × .10 = 5100 × .10 = 10 A threat-likelihood-impact matrix. Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Risk Management Process Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Risk Management Risk: Probability of loss Vulnerability: System weakness Threat: Potential harm Risk Management Process (Cont.)
  • 9. Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Assess risks Identify risks to manage Select controls Implement and test controls Evaluate controls Cost-Benefit Analysis Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Principle of Proportionality Cost-benefit analysis (CBA) Cost of control Projected benefits
  • 10. The amount spent on controls should be proportional to the risk Helps determine which controls, or countermeasures, to implement Profitability Versus Survivability Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Out-of-pocket costs Lost opportunity costs Future costs Client and stakeholder confidence Total cost of security Risk-Handling Strategies Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend
  • 11. Learning Company. www.jblearning.com Various Techniques of Risk Management Avoiding Sharing or transferring Mitigating Accepting Residual Risk Summary Risk and its relationship to threat, vulnerability, and asset loss Classifying business risk in relation to the seven domains of a typical IT infrastructure Risk identification techniques Risk management process Strategies for handling risk Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com 10/8/2020
  • 12. 21 Healthcare Cost and Utilization Project (HCUP) Virtual Field Trip (1:57): https://www.youtube.com/watch?v=m2xytHIm3K0 Started in 1988 Our most comprehensive source of hospital care data Data collected from these types of encounters: in-patient stays ambulatory surgery and services visits emergency department Includes clinical and nonclinical data (diagnoses and procedures, discharge status, patient demographics, and charges) for all patients, regardless of payer (e.g., Medicare, Medicaid, private insurance, uninsured) Enables researchers, insurers, policymakers and others to study health care delivery and patient outcomes over time Family of databases, software tools and related products Data is used for research on health policy issues: cost and quality of health services medical practice patterns access to health care programs outcomes of treatments at the national, State, and local market levels. Virtual Field Trip (20:27): https://www.youtube.com/watch?v=n7aZLAMJDRw
  • 13. Helpful Resources Chapter 8: Secondary Data Sources AHRQ Views: Watch 3 videos on this page! https://www.ahrq.gov/news/blog/ahrqviews/health-data- community-datapalooza.html Review this article: Great explanation of how HCUP collects data. https://www.businessinsider.com/most-expensive-health- conditions-hospital-costs-2018-2 The average hospital stay in the US costs just over $10,700, based on an analysis of recent data from the Healthcare Cost and Utilization Project (HCUP). In total, there were 35.4 million hospital stays with an aggregate cost of $384.5 billion. HCUP Infographics! HCUP Statistical Briefs: https://www.hcup-us.ahrq.gov/reports/statbriefs/statbriefs.jsp HCUP Infographics: https://hcup-us.ahrq.gov/reports/infographics.jsp More Helpful Resources Healthcare Cost and Utilization Project: U.S. Department of Health & Human Services http://www.ahrq.gov/research/data/hcup/ https://www.hcup-us.ahrq.gov/
  • 14. Research so that you understand what the H-CUP program is all about! Interactive Tutorial: https://www.hcup- us.ahrq.gov/HCUP_Overview/HCUP_Overview/index.html State Information: https://www.hcup-us.ahrq.gov/partners.jsp Unit 6 Assignment Healthcare Cost and Utilization Project: U.S. Department of Health & Human Services http://www.ahrq.gov/research/data/hcup/ ** https://www.hcup-us.ahrq.gov/ ** Create a 1-page informational flyer for the Healthcare Cost and Utilization Project. You should use Microsoft Word or Microsoft Publisher to create your advertisement. Include the following information: What is the HCUP Program? There are several different database tools used in this program. Name at least 4 database tools and give a summary for each. Indicate on the advertisement if your state participates in the HCUP program. If your state does participate in the program, provide the contact information for the person listed. Looking Ahead: Unit 6 Assignment National (Nationwide) Inpatient Sample (NIS): is the largest publicly available all-payer hospital inpatient care database in the United States. Researchers and policymakers use
  • 15. NIS data to identify, track, and analyze trends in health care utilization, access, charges, quality, and outcomes. Kids' Inpatient Database (KID): is composed of hospital inpatient stays for children and is specifically designed to allow researchers to study a broad range of conditions and procedures related to children's health. Researchers and policymakers can use KID data to identify, track, and analyze health care utilization, access, charges, quality, and outcomes. Nationwide Emergency Department Sample (NEDS): captures information on emergency department (ED) visits that do not result in an admission as well as ED visits that result in an admission to the same hospital. The NEDS enables analyses of ED utilization patterns and supports public health professionals, administrators, policymakers, and clinicians in their decision making regarding this critical source of care. State Emergency Department Databases (SEDD): are a set of databases that capture discharge information on all emergency department visits that do not result in an admission. The SEDD combined with SID discharges that originate in the emergency department are well suited for research and policy questions that require complete enumeration of hospital-based emergency departments within market areas or States.