#Security of #Information #Systems - Lecture 5 : Risk Management & Business Continuity Management
SECourses
#IT #IoT #Hacking #Internet #Computer #Cyber #Attack #Injection #Attacks #Course Hello everyone. My name is Furkan Gözükara, and I am a Computer Engineer Ph.D. Assistant Professor at the Software Engineering department.
In this course, we will learn general overview and some in depth information about how to secure online information systems.
Security of online systems and IT is a whole area of profession. You can become expert of this area and find very well paying jobs.
Security of Information Systems Full Course Playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslM_o92NwkaUzD7C6Fekx26
GitHub repository of the course : https://github.com/FurkanGozukara/Security-of-Information-Systems-CSE413-2020
Discord channel link of the course : https://discord.gg/6Mrb8MwteQ How to use Discord : https://youtu.be/AEwPtYiLvsQ
This course does not require you to have any knowledge about programming in any programming language.
However, if you want to start learning programming or develop your other Software Engineering related skills you can watch our below full courses:
[1] Introduction to Programming Full Course with C# playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffskoSXySh0MdiayPJsBZ7m2o
[2] Object Oriented Programming Full Course with C# playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffsnH3XJb66FDIHh1yHwWC26I
[3] Artificial Intelligence (AI) and Machine Learning (ML) Full Course with C# Examples playlist: https://www.youtube.com/playlist?list=PL_pbwdIyffskVschrADCL6KEnL_nqDtgD
[4] Software Engineering Full Course playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslgxMVyXhnHiSn_EWTvx1G-
[5] Security of Information Systems Full Course playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslM_o92NwkaUzD7C6Fekx26
[6] (Turkish) Bilgisayar Becerileri Tam Ders playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffsmyE2e909ea1MXLcMb8MenG
Lecture 5 : Risk Management, Business Continuity Management
- What is risk?
- Abstract Risk Model (NSM)
- Detailed risk model
- Many Risks
- Practical risk model
- Risk Management standards
- What is risk management?
- Risk management process ISO 27005
- Risk assessment process ISO 27005
- Risk Management – ISMS integration
- Basis for assessing risk
- Roles involved in risk management
- Problems of measuring risk
- Asset Valuation and Prioritization
- Threat scenario identification
- Threat Scenario Modelling
- Attacker-centric attack tree example
- System-centric threat modelling example
- Asset-centric threat modelling example
- Vulnerability Identification
- Identifying specific risks
- Estimating risk levels
- Qualitative likelihood scale
- Qualitative impact level scale
- Qualitative risk estimation - example
- Semi-quantitative risk estimation - example
- Quantitative risk estimation example
- Risk listing and ranking
- Risk Control Strategies
- Economy of security controls
- Business Continuity Management
- Effect of BCM
- How common is BCM in ‘the real world’?
- Business continuity management
- Business Continuity Plan (BCP)
- BCP Terminology
- BCP Management (same as IRBC)
- BIA: Business Impact Analysis
- BIA (continued)
- Alternative Sites
- BCP Testing
Auto timed subtitle : success ... https://www.youtube.com/watch?v=90yaFsiDc3w
373008419 Bytes