OCU C)ISSO A Discussion Lesson 01
- This topic has 10 replies, 8 voices, and was last updated 1 month, 2 weeks ago by
Trae Johnson.
-
AuthorPosts
-
-
November 1, 2024 at 1:26 pm #99329
Manny Varela
KeymasterAs a Systems Security Officer, why is risk management important? Be sure to address the importance of protecting assets, measuring the threat to those assets, and how the controls address the level of risk.
Use at least three of the terms discussed in this chapter in your response. Use the text and examples from the video in your response.
-
November 12, 2025 at 3:47 pm #111155
Carlos Martes
ParticipantRisk Manager is vital for a Systems Security Officer because it helps identify, assess, and control potential threats before they impact an organizations assets. Every organization has valuable assets, such as data, hardware, and networks that must be protected. By conducting a risk assessment, we can measure the likelihood and impact of threats, such as cyberattacks, or system failures. Once we know the level of risk, we can apply security controls like firewalls, encryption, or access control policies to reduce it. The goal of risk mitigation is not to eliminate all risk but to manage it to an acceptable level that aligns with the organizations tolerance. Without effective risk management, assets could be exposed to vulnerabilities, leading to data loss, financial damage, or reputational harm. Therefore, consistent monitoring and updating of controls ensure the organization stays protected against evolving threats.
-
November 17, 2025 at 9:37 pm #111299
Isabelle Tubbs
ParticipantHi, Carlos. Nice work explaining the importance of risk management. It is good to keep in mind an organization’s tolerance and needs when creating a risk management plan. Ultimately, the plan should provide a better understanding of how to reduce risk so that the company can be better protected from attacks.
-
-
November 13, 2025 at 7:28 pm #111194
Mjulius513
ParticipantRisk management is the process of understanding what could harm an organization and deciding how to protect it. In the video, they explained that we start by looking at what assets we have, like data, computers, and people. Risk management helps us stay organized, so we don’t miss anything important.
Risk assessment is a major step in risk management. This is where we identify threats, such as hackers or accidents, and look for vulnerabilities, like weak passwords or unlocked rooms. I learned how even small weaknesses can create big problems if a threat takes advantage of them. During risk assessment, we also think about the impact, meaning how much damage the organization would suffer if something went wrong.
Responding to risk means choosing what to do after we understand the risk level. I learned to talk about options like mitigating the risk by adding controls, avoiding the risk by stopping the activity, transferring it with insurance, or accepting it if it is low.-
November 16, 2025 at 6:42 pm #111241
Carlos Martes
ParticipantGood input Mjulius!
Risk management means finding what could harm an organization and choosing how to protect it. Risk assessment looks for threats, weakness, and the damage they could cause. After understanding the risk, we decide how to handle it, reduce it, and then avoid it by transferring it with insurance or accept it if its low. -
November 20, 2025 at 10:32 am #111352
Trae Johnson
ParticipantYou have done a great job in highlighting how risk assessment breaks down threats, vulnerabilities, and impact. I especially liked how you mentioned responses to risk, as selecting to mitigate, avoid, transfer, or accept risk is a huge part of managing risk competently.
-
-
November 15, 2025 at 11:11 am #111226
Isabelle Tubbs
ParticipantRisk, which can be defined as the measure of threat to an asset, is important to an organization’s level of security. In order to protect assets, security measures should be put in place to reduce risks. These controls must be working well and properly addressing certain types of threats. Adding firewalls can add a software level of protection, and implementing guards and policies can further add to protection.
A threat is essentially an unfavorable action performed by some entity on an asset. Measuring assets and potential threats is a big part of creating a good risk assessment. It is meant to give a good understanding of what threats exist, what it could mean for the company, and ways to prevent or lessen the damage of these threats.
In total, risk management could be defined as a combination of good risk assessment, monitoring resources and systems, and trying to reduce risk.-
November 15, 2025 at 3:11 pm #111229
Mjulius513
ParticipantYour explanation of risk is clear, and I agree that understanding threats and assets is important for strong security. Risk assessment helps identify what could harm the company, while controls like firewalls, guards, and policies reduce that danger. Good risk management really depends on constant monitoring and updating protections.
-
November 20, 2025 at 10:30 am #111351
Trae Johnson
ParticipantYou elaborated well on how risks relate to assets and why controls matter. I agree that the identification of threats and matching them with the right safeguards is central to strong risk assessment. Your point about combining software controls with policies and physical protection shows a good understanding of layered security.
-
-
November 18, 2025 at 4:29 pm #111317
Kanthony
ParticipantGreat job with these responses. Please keep working to add even more detail. This will help you learn even more.
-
November 20, 2025 at 10:29 am #111350
Trae Johnson
ParticipantThis is important because risk management provides a structured way for the Systems Security Officer to protect an organization’s assets and ensures that security decisions are based on real, measurable threats. Assets include data, hardware, software, and even personnel that have value; therefore, understanding their importance enables an organization to prioritize what must be protected first. The use of a thorough risk assessment will help identify threats, vulnerabilities, and the potential impact if those assets are compromised. As the video highlighted, knowing both the likelihood of a threat and the severity of the impact allows us to calculate the level of risk more accurately.
Once risks are identified, the subsequent process involves the selection of security controls to lower the risks to an acceptable level. Controls include technical safeguards, such as firewalls; administrative measures, such as policies; and physical protections, such as secure facilities. These will be selected based on their applicability to specific vulnerabilities and their effectiveness in reducing overall risk. Continuous monitoring and periodic evaluation keep an organization protected against the evolving threat spectrum. In other words, risk management enables the Systems Security Officer to make informed decisions, apply appropriate controls, and protect the confidentiality, integrity, and availability of critical assets.
-
-
AuthorPosts
- You must be logged in to reply to this topic.