SlideShare a Scribd company logo
In the Name of ALLAH,
the Most Beneficent the Most Merciful

Topic:
Risk & Risk Controlling
Presented By:
Daniyal Khan (0047)
Information Security Management

A situation involving exposure of
danger or uncertainty of
profit/loss is called Risk.
Risk

There are four types of risk control.
1) Accept Risk
2) Mitigate Risk
3) Eliminate Risk
4) Transfer Risk
Types of risk control

The stakeholders who are responsible for a risk
can choose to accept a risk. For example, the
risk that a project may fail may be accepted if
the project is of planned importance.
Risk management may include an approval
process for risk acceptance.
Accept Risk

Actions are taken to reduce risk to an
acceptable level. For example, the
organization assigns a top performing
project management team to a project to
reduce the risk that it will fail.
Mitigate Risk

When you mitigate risks it's important to
consider secondary risks. Secondary risks are
the risks that are caused by your risk mitigation
efforts.
If you reduce a security risk by applying an
update to software there's a risk that the update
itself contains security vulnerabilities. In some
cases, mitigation activities are higher risk than
the risk they reduce.
Secondary Risk

A risk may be reduced to zero. Normally
the only way to achieve this is to stop the
activity that generates the risk. For
example, selling a risky investment will
eliminate the risks associated with that
investment.
Eliminate Risk

A risk may be transferred to another
organization or individual. For
example, fire insurance transfers the
risk of asset damage due to fire.
Transfer Risk


More Related Content

What's hot

Understanding Your Risk Management Strategy
Understanding Your Risk Management StrategyUnderstanding Your Risk Management Strategy
Understanding Your Risk Management Strategy
Filial15
 
Crisis And Risk
Crisis And RiskCrisis And Risk
Crisis And Risk
kktv
 
Risk Management for Online PR
Risk Management for Online PRRisk Management for Online PR
Risk Management for Online PR
David Phillips
 
Risk management presentation
Risk management presentationRisk management presentation
Risk management presentation
abpeters82
 
Risk control types Slides
Risk control types SlidesRisk control types Slides
Risk control types Slides
Muhammad Ahmad Badar
 
Crisis management
Crisis managementCrisis management
Crisis management
Business Management
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recovery
Hrushikesh Wakhle
 
Building an Effective AML Program
Building an Effective AML ProgramBuilding an Effective AML Program
Building an Effective AML Program
Corporater
 
Financial Management Of Head Starts.1.Qa
Financial Management Of Head Starts.1.QaFinancial Management Of Head Starts.1.Qa
Financial Management Of Head Starts.1.Qa
Reginald Walker
 
Risk management
Risk management Risk management
Risk management
mamta bhaurya
 
Risk management
Risk managementRisk management
Risk management
Manish Tiwari
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
Resolver Inc.
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
Resolver Inc.
 
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8:  Risk Evaluation and Mitigation StrategiesSecurity Risk management Chapther 8:  Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
Ernst Dettbarn
 
Chapter 2 (crisis management)
Chapter 2 (crisis management)Chapter 2 (crisis management)
Chapter 2 (crisis management)
Abdul Jawad Chaudhry
 
Project risk management principles
Project risk management principlesProject risk management principles
Project risk management principles
alexgr89
 
Risk management
Risk managementRisk management
Risk management
baderali2141
 
Crisis management for non crisis managers Taha ABULAYNIN
Crisis management for non crisis managers Taha ABULAYNINCrisis management for non crisis managers Taha ABULAYNIN
Crisis management for non crisis managers Taha ABULAYNIN
Taha ABULAYNIN
 
Fiba 500 risk management
Fiba 500 risk managementFiba 500 risk management
Fiba 500 risk management
Emmanuel Oshogwe Akpeokhai
 
Crisis Management Strategies When Disaster Strikes
Crisis Management Strategies When Disaster StrikesCrisis Management Strategies When Disaster Strikes
Crisis Management Strategies When Disaster Strikes
The Windsdor Consulting Group, Inc.
 

What's hot (20)

Understanding Your Risk Management Strategy
Understanding Your Risk Management StrategyUnderstanding Your Risk Management Strategy
Understanding Your Risk Management Strategy
 
Crisis And Risk
Crisis And RiskCrisis And Risk
Crisis And Risk
 
Risk Management for Online PR
Risk Management for Online PRRisk Management for Online PR
Risk Management for Online PR
 
Risk management presentation
Risk management presentationRisk management presentation
Risk management presentation
 
Risk control types Slides
Risk control types SlidesRisk control types Slides
Risk control types Slides
 
Crisis management
Crisis managementCrisis management
Crisis management
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recovery
 
Building an Effective AML Program
Building an Effective AML ProgramBuilding an Effective AML Program
Building an Effective AML Program
 
Financial Management Of Head Starts.1.Qa
Financial Management Of Head Starts.1.QaFinancial Management Of Head Starts.1.Qa
Financial Management Of Head Starts.1.Qa
 
Risk management
Risk management Risk management
Risk management
 
Risk management
Risk managementRisk management
Risk management
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
 
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8:  Risk Evaluation and Mitigation StrategiesSecurity Risk management Chapther 8:  Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
 
Chapter 2 (crisis management)
Chapter 2 (crisis management)Chapter 2 (crisis management)
Chapter 2 (crisis management)
 
Project risk management principles
Project risk management principlesProject risk management principles
Project risk management principles
 
Risk management
Risk managementRisk management
Risk management
 
Crisis management for non crisis managers Taha ABULAYNIN
Crisis management for non crisis managers Taha ABULAYNINCrisis management for non crisis managers Taha ABULAYNIN
Crisis management for non crisis managers Taha ABULAYNIN
 
Fiba 500 risk management
Fiba 500 risk managementFiba 500 risk management
Fiba 500 risk management
 
Crisis Management Strategies When Disaster Strikes
Crisis Management Strategies When Disaster StrikesCrisis Management Strategies When Disaster Strikes
Crisis Management Strategies When Disaster Strikes
 

Similar to Risk Controlling in ISM

Introduction to Risk ManagementMana.6330Overview
Introduction to Risk ManagementMana.6330OverviewIntroduction to Risk ManagementMana.6330Overview
Introduction to Risk ManagementMana.6330Overview
TatianaMajor22
 
Risk
Risk Risk
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
gilbertkpeters11344
 
Risk-Management-ppt.pptx
Risk-Management-ppt.pptxRisk-Management-ppt.pptx
Risk-Management-ppt.pptx
YashuShukla2
 
IT Policy, RISK MANAGEMENT
IT Policy, RISK MANAGEMENTIT Policy, RISK MANAGEMENT
IT Policy, RISK MANAGEMENT
University of Basrah
 
Risk Management Essay
Risk Management EssayRisk Management Essay
Chapter2 risk management process
Chapter2  risk management processChapter2  risk management process
Chapter2 risk management process
Dr Riyaz Muhmmad
 
Insurance And Risk Management
Insurance And Risk ManagementInsurance And Risk Management
Insurance And Risk Management
Tarseam Singh
 
2 Risk managemennt Chapter 2_ NGUC_2020.ppt
2 Risk managemennt Chapter 2_ NGUC_2020.ppt2 Risk managemennt Chapter 2_ NGUC_2020.ppt
2 Risk managemennt Chapter 2_ NGUC_2020.ppt
Hailemariam
 
A Risk Analysis and Management in Software Engineering
A Risk Analysis and Management in Software Engineering A Risk Analysis and Management in Software Engineering
A Risk Analysis and Management in Software Engineering
MuhammadTalha436
 
Webinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessWebinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and Effectiveness
Invensis Learning
 
risk management
risk managementrisk management
risk management
muhammad shoaib
 
4A Prevention SystemOverviewDefining the Overall Se.docx
4A Prevention SystemOverviewDefining the Overall Se.docx4A Prevention SystemOverviewDefining the Overall Se.docx
4A Prevention SystemOverviewDefining the Overall Se.docx
gilbertkpeters11344
 
Risk management
Risk managementRisk management
Risk management
Shyam Sunder Budhwar
 
Project Risk Management
Project  Risk ManagementProject  Risk Management
Project Risk Management
Kelvin Fredson
 
Dealing with Risk
Dealing with  RiskDealing with  Risk
Dealing with Risk
furqi1
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
christinemaritza
 
Learning ObjectivesAppraise mitigation measures a business m.docx
Learning ObjectivesAppraise mitigation measures a business m.docxLearning ObjectivesAppraise mitigation measures a business m.docx
Learning ObjectivesAppraise mitigation measures a business m.docx
washingtonrosy
 
Learning ObjectivesAppraise mitigation measures a business m.docx
Learning ObjectivesAppraise mitigation measures a business m.docxLearning ObjectivesAppraise mitigation measures a business m.docx
Learning ObjectivesAppraise mitigation measures a business m.docx
manningchassidy
 
What cybersecurity risk management entails
What cybersecurity risk management entailsWhat cybersecurity risk management entails
What cybersecurity risk management entails
Cyberhunter Cyber Security
 

Similar to Risk Controlling in ISM (20)

Introduction to Risk ManagementMana.6330Overview
Introduction to Risk ManagementMana.6330OverviewIntroduction to Risk ManagementMana.6330Overview
Introduction to Risk ManagementMana.6330Overview
 
Risk
Risk Risk
Risk
 
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
 
Risk-Management-ppt.pptx
Risk-Management-ppt.pptxRisk-Management-ppt.pptx
Risk-Management-ppt.pptx
 
IT Policy, RISK MANAGEMENT
IT Policy, RISK MANAGEMENTIT Policy, RISK MANAGEMENT
IT Policy, RISK MANAGEMENT
 
Risk Management Essay
Risk Management EssayRisk Management Essay
Risk Management Essay
 
Chapter2 risk management process
Chapter2  risk management processChapter2  risk management process
Chapter2 risk management process
 
Insurance And Risk Management
Insurance And Risk ManagementInsurance And Risk Management
Insurance And Risk Management
 
2 Risk managemennt Chapter 2_ NGUC_2020.ppt
2 Risk managemennt Chapter 2_ NGUC_2020.ppt2 Risk managemennt Chapter 2_ NGUC_2020.ppt
2 Risk managemennt Chapter 2_ NGUC_2020.ppt
 
A Risk Analysis and Management in Software Engineering
A Risk Analysis and Management in Software Engineering A Risk Analysis and Management in Software Engineering
A Risk Analysis and Management in Software Engineering
 
Webinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessWebinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and Effectiveness
 
risk management
risk managementrisk management
risk management
 
4A Prevention SystemOverviewDefining the Overall Se.docx
4A Prevention SystemOverviewDefining the Overall Se.docx4A Prevention SystemOverviewDefining the Overall Se.docx
4A Prevention SystemOverviewDefining the Overall Se.docx
 
Risk management
Risk managementRisk management
Risk management
 
Project Risk Management
Project  Risk ManagementProject  Risk Management
Project Risk Management
 
Dealing with Risk
Dealing with  RiskDealing with  Risk
Dealing with Risk
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
 
Learning ObjectivesAppraise mitigation measures a business m.docx
Learning ObjectivesAppraise mitigation measures a business m.docxLearning ObjectivesAppraise mitigation measures a business m.docx
Learning ObjectivesAppraise mitigation measures a business m.docx
 
Learning ObjectivesAppraise mitigation measures a business m.docx
Learning ObjectivesAppraise mitigation measures a business m.docxLearning ObjectivesAppraise mitigation measures a business m.docx
Learning ObjectivesAppraise mitigation measures a business m.docx
 
What cybersecurity risk management entails
What cybersecurity risk management entailsWhat cybersecurity risk management entails
What cybersecurity risk management entails
 

More from Daniyal Khan

My Mechanic
My MechanicMy Mechanic
My Mechanic
Daniyal Khan
 
Windows 7 Architecture
Windows 7 ArchitectureWindows 7 Architecture
Windows 7 Architecture
Daniyal Khan
 
Network News Transfer Protocol
Network News Transfer ProtocolNetwork News Transfer Protocol
Network News Transfer Protocol
Daniyal Khan
 
Introducing a new product in a market.
Introducing a new product in a market.Introducing a new product in a market.
Introducing a new product in a market.
Daniyal Khan
 
Honda
HondaHonda
Qualities Of A Good Leader
Qualities Of A Good LeaderQualities Of A Good Leader
Qualities Of A Good Leader
Daniyal Khan
 
Condition Statement
Condition StatementCondition Statement
Condition Statement
Daniyal Khan
 
E-mail System
E-mail SystemE-mail System
E-mail System
Daniyal Khan
 
Fiber Optics Technology
Fiber Optics TechnologyFiber Optics Technology
Fiber Optics Technology
Daniyal Khan
 

More from Daniyal Khan (9)

My Mechanic
My MechanicMy Mechanic
My Mechanic
 
Windows 7 Architecture
Windows 7 ArchitectureWindows 7 Architecture
Windows 7 Architecture
 
Network News Transfer Protocol
Network News Transfer ProtocolNetwork News Transfer Protocol
Network News Transfer Protocol
 
Introducing a new product in a market.
Introducing a new product in a market.Introducing a new product in a market.
Introducing a new product in a market.
 
Honda
HondaHonda
Honda
 
Qualities Of A Good Leader
Qualities Of A Good LeaderQualities Of A Good Leader
Qualities Of A Good Leader
 
Condition Statement
Condition StatementCondition Statement
Condition Statement
 
E-mail System
E-mail SystemE-mail System
E-mail System
 
Fiber Optics Technology
Fiber Optics TechnologyFiber Optics Technology
Fiber Optics Technology
 

Recently uploaded

留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 

Recently uploaded (20)

留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 

Risk Controlling in ISM

  • 1. In the Name of ALLAH, the Most Beneficent the Most Merciful
  • 2.  Topic: Risk & Risk Controlling Presented By: Daniyal Khan (0047) Information Security Management
  • 3.  A situation involving exposure of danger or uncertainty of profit/loss is called Risk. Risk
  • 4.  There are four types of risk control. 1) Accept Risk 2) Mitigate Risk 3) Eliminate Risk 4) Transfer Risk Types of risk control
  • 5.  The stakeholders who are responsible for a risk can choose to accept a risk. For example, the risk that a project may fail may be accepted if the project is of planned importance. Risk management may include an approval process for risk acceptance. Accept Risk
  • 6.  Actions are taken to reduce risk to an acceptable level. For example, the organization assigns a top performing project management team to a project to reduce the risk that it will fail. Mitigate Risk
  • 7.  When you mitigate risks it's important to consider secondary risks. Secondary risks are the risks that are caused by your risk mitigation efforts. If you reduce a security risk by applying an update to software there's a risk that the update itself contains security vulnerabilities. In some cases, mitigation activities are higher risk than the risk they reduce. Secondary Risk
  • 8.  A risk may be reduced to zero. Normally the only way to achieve this is to stop the activity that generates the risk. For example, selling a risky investment will eliminate the risks associated with that investment. Eliminate Risk
  • 9.  A risk may be transferred to another organization or individual. For example, fire insurance transfers the risk of asset damage due to fire. Transfer Risk
  • 10.