About This Chapter
Cybersecurity Risk Management - Chapter Summary
Discover or strengthen your existing knowledge of cybersecurity risk management with help from our entertaining lessons. No matter your current understanding of risk management for information technology, risk analysis and management in business or key controls in cybersecurity risk management, our instructors can help you gain full comprehension. Learn about these and other related topics by studying the lessons, then take short quizzes to find out how much you understand. The dashboard can track your progress and allows you to send any lesson topic questions to our experts. By the end of this chapter, you will be ready to:
- Compare and contrast risk analysis and risk management in business
- Exhibit an understanding of risk management for information technology
- Describe the system analysis and design life cycle
- Explain the significance of the FIPS Publication 199 & 200
- Discuss the impact of business objectives and cybersecurity risk management
- Describe how to manage cybersecurity risks through user training, awareness and accountability
- Define and discuss the use of key controls in cybersecurity risk management
1. Risk Analysis & Risk Management in Business: Overview, Objectives & Comparison
A successful business requires careful attention to the allocation of resources and, just as important, to the degree to which those resources are exposed to risk. In this lesson, we'll discuss the importance of risk analysis and management in business.
2. Risk Management for Information Technology
In this lesson, we'll learn about risk management in an IT setting and how to develop and enact responses to risks in the workplace. Take a short quiz afterward to test your knowledge.
3. The System Analysis & Design Life Cycle
When you build a house, you start with a floor plan. When you build an information system (hardware, software or both), you go through the system development life cycle (SDLC). In this lesson, we'll examine the steps of the SDLC.
4. FIPS Publication 199 & 200: Overview & Significance
The FIPS publication series has ramifications for federal information systems and their security. In this lesson, you'll learn more about FIPS and its two most popular documents and what they require.
5. Business Objectives & Cybersecurity Risk Management: Impact & Examples
Cybersecurity risks complicate planning business objectives, but should be a part of the process. In this lesson, you'll learn more about thinking ''cybersecurity'' when developing operational, financial, compliance, and strategic objectives.
6. Managing Cybersecurity Risks through User Training, Awareness & Accountability
In this lesson, we will be exploring the role of the user awareness and training program as a component in the practice of managing cybersecurity risks. We will distinguish security awareness, training, and education and relate the importance of accountability to the awareness and training program.
7. Key Controls in Cybersecurity Risk Management: Definition & Use
Key controls help alleviate risks to business, from the information security department and beyond. In this lesson, you'll learn more about these controls, why they're important and how they help manage activities.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 332: Cybersecurity Policies and Management course
- Intro to Cybersecurity
- The Cybersecurity Threat Landscape
- Information Security Policy
- Information Security Strategy Development
- Cybersecurity Policy, Governance & Management
- Data Access Control
- Partner & Vendor Security Management
- Security Awareness Training
- Information Security Compliance
- Information Security Performance Metrics
- Required Assignments for Computer Science 332