2.0
Theoretical Framework ................................................................................................................. 4
2.1
Review of appropriate literature .............................................................................................. 4
2.2
Information Security Overview ............................................................................................... 4
2.3
Information Security Model .................................................................................................... 4
2.3.1
Availability
...................................................................................................................... 5
2.3.2
Integrity
........................................................................................................................... 5
2.3.3
Confidentiality
.................................................................................................................. 5
2.3.4
Authentication
.................................................................................................................. 6
2.4
Information Security Management System .............................................................................. 6
2.5
ISO Standards of Information Security Management System (ISMS) ....................................... 7
2.6
Information Security Management Policies .............................................................................. 8
2.6.1
Access Control
................................................................................................................. 8
2.6.2
Email Usage Policy
.......................................................................................................... 9
2.6.3
Internet Usage Policy
........................................................................................................ 9
2.6.4
Password Management Policy
.......................................................................................... 9
2.6.5
System Usage Policy
...................................................................................................... 10
2.6.6
Incident Handling Policy
................................................................................................ 10
2.7
Risk ...................................................................................................................................... 10
2.8
Operational Risks and its Types............................................................................................. 11
2.9
Operational Risks in Financial Organizations ........................................................................ 12
2.10
Operational Risk Management .............................................................................................. 13
2.11
General Risk Management Approach .................................................................................... 14
2.11.1
Risk Avoidance
.............................................................................................................. 15
2.11.2
Risk Reduction
............................................................................................................... 15
2.11.3
Risk Transfer
.................................................................................................................. 16
2.11.4
Risk Retention
................................................................................................................ 16
2.12
Impact of Operational Risks on Business ................................................................................ 16
2.12.1
Reputation Loss
.............................................................................................................. 17
2.12.2
Financial Loss
................................................................................................................ 17
2.12.3
Business Demolish
......................................................................................................... 17
2.13
Management Commitment and Involvement........................................................................... 17
2.14
Conceptual Framework .......................................................................................................... 18
Do'stlaringiz bilan baham: |