    {"id":1404,"date":"2019-01-04T20:31:01","date_gmt":"2019-01-04T13:31:01","guid":{"rendered":"http:\/\/student-activity.binus.ac.id\/isgbinus\/?p=1404"},"modified":"2019-01-04T20:31:26","modified_gmt":"2019-01-04T13:31:26","slug":"what-is-information-risk-management","status":"publish","type":"post","link":"https:\/\/student-activity.binus.ac.id\/isgbinus\/2019\/01\/what-is-information-risk-management\/","title":{"rendered":"What is Information Risk Management?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium\" src=\"http:\/\/themocracy.com\/wp-content\/uploads\/2016\/07\/Risk-Management-696x450.jpg\" width=\"696\" height=\"450\" \/><\/p>\n<p style=\"text-align: center\"><strong>Michelle Yasuwito<\/strong><\/p>\n<p style=\"text-align: center\"><strong>2101701235<\/strong><\/p>\n<p>Sumber Gambar : http:\/\/themocracy.com\/an-introduction-to-risk-management-information-systems\/<\/p>\n<p>&nbsp;<\/p>\n<p>If you search the term <em>information risk management<\/em> (IRM) on Google, you\u2019ll likely come up with many lengthy explanations and definitions. And while you can learn more about IRM by searching the terms \u201cNIST\u201d and \u201c800-53,\u201d many of the definitions you\u2019ll come across are either too vague, or they focus entirely on theory instead of practice. In response, we\u2019ve taken a crack at a simple, yet sufficient working definition: <em>Information risk management (IRM): The policies, procedures, and technology one adopts in order to reduce the threats, vulnerabilities, and consequences that could arise if data is not protected.<\/em><\/p>\n<p>When the average person thinks about a threat, they tend to envision hackers and those with malicious intent from outside an organization attempting to steal data or valuable information through physical or cyber means. This is considered an <em>intentional<\/em> threat. But it\u2019s important to understand that threats to an organization\u2019s information can be both intentional and <em>unintentional<\/em>. An unintentional threat might be an employee who doesn\u2019t handle data properly or an IT manager that is careless with an organization\u2019s IT infrastructure. It could also be a security flaw that allows a break-in to take place.<\/p>\n<p>Information risk management examines this classic equation for risk:<\/p>\n<p><strong><a href=\"https:\/\/blog.bitsighttech.com\/vendor-management-best-practices?__hstc=208292109.389459ddd2ef274093718c04ab0c2899.1545740891959.1545740891959.1545740891959.1&amp;__hssc=208292109.1.1545740891959&amp;__hsfp=1702786182\">Threat \u00a0x \u00a0Vulnerability \u00a0x \u00a0Consequence<\/a><\/strong><\/p>\n<p><strong>Threat<\/strong> is inherent in information risk management, and most organizations assume that their vendors offer at least some level of threat.<\/p>\n<p><strong>Vulnerability<\/strong> comprises the gaps in a protection program. Let\u2019s say you have a really sensitive document and you put it in a safe, in a locked building, protected by guards. You likely feel confident that the document isn\u2019t vulnerable to many threats. Now, if that same document was online in an open network where your organization stores all of its data, it\u2019s easy to understand how this compromises the safety of the document. The moral of this story is to understand not only what the vulnerabilities are in your protection program, but also how the vulnerabilities can be exploited. Once you parse through this information, you\u2019ll gain a clearer idea of how to address your overall risk.<\/p>\n<p>Another really important element in IRM is understanding the <em>value<\/em> of the information you\u2019re trying to protect, because <strong>consequence<\/strong> depends largely on this. But, as you know, the value of your information varies tremendously. Some<u><a href=\"https:\/\/blog.bitsighttech.com\/proactive-cyber-risk-management?__hstc=208292109.389459ddd2ef274093718c04ab0c2899.1545740891959.1545740891959.1545740891959.1&amp;__hssc=208292109.1.1545740891959&amp;__hsfp=1702786182\"> information holds value<\/a><\/u> because your organization considers it to be of great value. This may include very sensitive designs, blueprints, or pricing. But sometimes information has value because there are legal requirements for protecting that data. Even if you don\u2019t consider personally identifiable information (PII) to be high priority, your customer (and the law) would most likely disagree with you. So in determining the consequence side of risk, your organization needs to ask what might happen if a particular piece of data is compromised.<\/p>\n<p><strong>Sumber Penulisan\/Daftar Pustaka :<\/strong> https:\/\/www.bitsight.com\/blog\/what-is-information-risk-management<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Michelle Yasuwito 2101701235 Sumber Gambar : http:\/\/themocracy.com\/an-introduction-to-risk-management-information-systems\/ &nbsp; If you search the term information risk management (IRM) on Google, you\u2019ll likely come up with many lengthy explanations and definitions. And while you can learn more about IRM by searching the terms \u201cNIST\u201d and \u201c800-53,\u201d many of the definitions you\u2019ll come across are either too vague, [&hellip;]<\/p>\n","protected":false},"author":67,"featured_media":1406,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-1404","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artikel"],"_links":{"self":[{"href":"https:\/\/student-activity.binus.ac.id\/isgbinus\/wp-json\/wp\/v2\/posts\/1404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/student-activity.binus.ac.id\/isgbinus\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student-activity.binus.ac.id\/isgbinus\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/isgbinus\/wp-json\/wp\/v2\/users\/67"}],"replies":[{"embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/isgbinus\/wp-json\/wp\/v2\/comments?post=1404"}],"version-history":[{"count":1,"href":"https:\/\/student-activity.binus.ac.id\/isgbinus\/wp-json\/wp\/v2\/posts\/1404\/revisions"}],"predecessor-version":[{"id":1405,"href":"https:\/\/student-activity.binus.ac.id\/isgbinus\/wp-json\/wp\/v2\/posts\/1404\/revisions\/1405"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/isgbinus\/wp-json\/wp\/v2\/media\/1406"}],"wp:attachment":[{"href":"https:\/\/student-activity.binus.ac.id\/isgbinus\/wp-json\/wp\/v2\/media?parent=1404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/isgbinus\/wp-json\/wp\/v2\/categories?post=1404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/isgbinus\/wp-json\/wp\/v2\/tags?post=1404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}