IT RISK ASSESMENT TEMPLATE - RISK FACTORS RISK MEASUREMENT...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
RISK FACTORS RISK MEASUREMENT PROCESS (Worksheet 7b) PREPARED BY: DATE: INSTRUCTIONS: 1. Enter Year, Prepared By, and Date in appropriate Cells. 2. List Risk Factors in use F1. .F10 by descriptions in Cells P2. .P11. 3. Alter the weights in Cells C15. .L15 to suit your risk model. The weights should sum to 1.00 (shown in Cell M15). 4. Enter the auditable units of the audit universe in column B. The associated Audit Numbers may be assigned and entered in column A. 5. Evaluate each auditable unit (audit) by assigning a score (1= low, 3= high) fo risk factor used in the model. The total risk score will be shown in column M. 6. The spreadsheet data may be sorted (recommended) to prioritze the auditab FACTORS F1 F2 F3 F4 F5 F6 F7 WEIGHTS 0.1 0.1 0.1 0.1 0.1 0.1 0.1 AUDIT # AUDIT UNIVERSE
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
YEAR: RISK FACTORS F1 Wksht7b.xls F2 F3 F4 F5 F6 F7 F8 for each F9 . F10 ble units. F8 F9 F10 TOTAL 0.1 0.1 0.1 1.00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
0 0 0 0 0
Background image of page 4
SORTED RISK ASSESMENT MATRIX Worksheet AUDITOR: AUDIT: DATA CENTER DATE: THREATS RANK 1 2 3 4 RANK COMPONENTS 1 2 HARDWARE HIGHEST RISK = 3 3 SOFTWARE In the left-most quadrant 4 5 6 PEOPLE 7 POWER x x INSTRUCTIONS: 1. Enter Auditor, Date, Audit in the spaces provided. 2. Enter Components (up to a maximum of 12) in Cells B8. .B20. 3. Assign Threats (up to a maximum of 12) to the Threat Axis (T1. .T12 # THREAT Threats can be documented by listing them in Cells B27. .B38. T1 4. Rank the Threats by choosing the most significant (assigning it the h T2 and the least significant (assigning it "1"), and so for with next-most a T3 If there are 9 Threats, the highest value = 9, etc. T4 Place the rankings in the RANK row Cells C6. .N6. T5 5. Use the "Data Sort" command to rearrange Cells C5. .N6 (2 rows), T6 using Cell C6 as the Primary Key and Sort Order Descending. T7 6. Similarly, rank the Components using Cells A8. .A20, with the most im T8 receiving the highest value (if 10 Components, the highest = 10, etc. T9 7. Use the "Data Sort" command to rearrange Cells A8. .B20 (2 column T10 using Cell A8 as the Primary Key and Sort Order Descending. T11 8. The matrix should now be sorted to reflect the highest risks in the up T12 and the lowest risks in the lower right corner (depending on matrix siz The matrix will register the number of cells to be marked HIGH RISK Contributed 8/8/00 by Bonnie_C UNAUTHORIZED EMPLOYEE SOFTWARE FAILURE DATA BACK UP FAILURE HARDWARE FAILURE POLICIES AND PROCEDURE PHYSICAL PROTECTION LOGICAL PROTECTION
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
AUDIT: RISK IDENTIFICATION FIRE INTRUDERS HACKERS 5 6 7 8 9 10 11 in Cells C5. .N5). highest number) and next-least. important component .). ns), pper left corner ize). (Cell H10). wksht3c.xls han@deanfoods.com DATA CORRUPTI ON NATURAL DISASTER POWER OUTAGE KEY COMPONENT FAILURE
Background image of page 6
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Risks Source / Cause Effects Integrity Data corruption Definition: Relevance No effective communication Access Data corruption, Errors, Omissions This risk encompasses all of the risks associated with the authorization, completeness, and accuracy of transactions as they are entered into,
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/28/2010 for the course MKTG 00HP01 taught by Professor Himanshu during the Spring '10 term at Indiana Institute of Technology.

Page1 / 22

IT RISK ASSESMENT TEMPLATE - RISK FACTORS RISK MEASUREMENT...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online