Chapter 1
Managing Risk
As an administrator, you are responsible
You must enable data to exist
You must protect it, authenticate it, secure it, and keep it in the form that complies with every applicable law, policy, and regulation.
Data can be accidentally deleted, overwritten, stolen, and lost.
Potential harms represent risks
Data can be corrupted, it can be accessed by those who shouldn’t see it, values can be changed
If the cost of preventing a particular risk from becoming a reality exceeds the value of the harm that could occur, then a cost-benefit risk calculation dictates that the risk should stand
Risk calculations weigh a potential threat against the likelihood or probability of it occurring.
Residual risk - fact that some risks will and must remain
Last updated