week 18

K1.18 The considerations in the design of a risk mitigation strategy:

A risk mitigation strategy outlines how an organisation plans to reduce or control risks to its digital systems and services. To be effective, it must be carefully designed with several key factors in mind.

Risk Response

You must first decide the type of response for each identified risk. This forms the foundation of the mitigation strategy.

Response Type Definition Example
Accept Take no action because risk is low or manageable Allow minor printer downtime once a month
Avoid Eliminate the risk by changing plans or approach Cancel a risky software upgrade
Mitigate Take steps to reduce the chance or impact Add firewall rules to reduce likelihood of intrusion
Transfer Pass risk to another party (e.g. through insurance) Outsource backup responsibilities to a cloud provider

 

User Profile

Consider the users involved in or affected by the mitigation plan. Different users have different needs and ability levels.

User Consideration Example
Requirements Mobile users may need secure remote access
Ability Level Non-technical staff may need simple instructions

 

Make sure security measures (e.g. password policies, multi-factor authentication) are appropriate and accessible for the intended users.

Cost and Benefit

Analyse the cost of mitigation against the potential impact of the risk. This helps justify whether it’s worth implementing.

Question to Ask Example
Is the solution affordable? Is upgrading to enterprise antivirus worth the £2,000 cost?
Is the benefit greater than the risk? Will a £500 UPS save more than that in downtime prevention?

 

Use cost-benefit analysis to support decision-making.

Assign an Owner of the Risk

Each risk should have a clearly defined risk owner – the person or team responsible for:

  • Monitoring the risk

  • Ensuring the mitigation actions are followed

  • Updating the risk’s status

| Example | A network administrator is assigned as the owner of the risk of firewall misconfiguration. |

This adds accountability and ensures the risk isn’t ignored.

Escalation to the Appropriate Authority

If a risk becomes too severe or cannot be resolved at a lower level, it should be escalated to management or another senior decision-maker.

| Example | A system vulnerability cannot be patched without budget approval, so it’s escalated to the IT Director. |

Escalation ensures critical decisions are made by those with the correct authority.

Planning Contingencies

Develop backup plans in case mitigation fails or the risk becomes reality. This includes:

  • Failover systems

  • Alternative access routes

  • Manual procedures

| Example | If the primary server fails, a contingency plan switches operations to a cloud-based backup server. |

Contingency planning reduces downtime and disruption.

 Monitoring and Reviewing Process

Once a risk mitigation strategy is in place, it must be monitored and reviewed regularly to ensure it still works and is up to date.

Activities Include Log reviews, testing controls, user feedback, security audits

Threats evolve – risk strategies must adapt too.

 

Design a Risk Mitigation Strategy

Scenario:
You’re designing a mitigation plan for the following risk: “Unsecured USB ports allow malware infections.”

Task:
1. Choose a risk response.

2.Consider:
   - Who the users areCost vs benefit
   - Who will own the risk
   - What the escalation route would be
   - What your contingency plan is
   - How the plan will be monitored

Extension: Create a short presentation outlining your strategy to a management board.

Class discussion on encryption as a risk mitigation technique, including different types of encryption, including data at rest and in transit.

Back it up, pack it in, let me begin

In small groups of 2-3 create a collaborative presentation that considers back-up techniques that will support risk mitigation.
Your presentation should identify:
    - The purpose of backups. 
    - Back up criteria (for example, frequency and storage). 
    - Type of backup (for example, full or incremental).  

 

 


Last Updated
2025-07-14 12:18:16

English and Maths

English


Maths


Stretch and Challenge

Stretch and Challenge


  • Fast to implement
  • Accessible by default
  • No dependencies
Homework

Homework


Equality and Diversity Calendar
How to's

How 2's Coverage

 

 




Links to Learning Outcomes

Links to Assessment criteria

 


Files that support this week


| | | | |
Week 17
Prev
Week 18
Prev
Week 19
Prev

Next