Overview of IS risk Assessment Part 11

Overview of IS risk Assessment Part 11 Research Paper example
College
Research Paper
Design & Technology
Pages 3 (753 words)
Download 0
Full Paper Title Name University Risk Assessment Computer network risk Assessment framework takes a holistic approach for accessing risks, threats and vulnerabilities of the organization’s information technology architecture. Likewise, this essential function incorporates a risk management framework led by a steering committee…

Introduction

The second step is to take the asset owners on board and define an asset classification scheme. This asset classification scheme defines the severity of all assets along with a value. This value will identify information assets connected on the computer network. Three of the important aspects that make the risk management framework recognizable are vulnerabilities, threats and exploits. Vulnerabilities are defined as weaknesses in a system, network, workstation, or server. This weakness can be exploited by a virus, Trojan, work, malware etc. Likewise, vulnerabilities are not inherent, as they can be created by poorly managing patch management procedures, operating system critical updates procedures, virus definition updates procedures, no adequate rules on firewall etc. These vulnerabilities can be exploited by threats such as a weak hole in an operating system can be exploited by a worm or virus attack. Threats are the known viruses, Trojans, root kits, malware, adware, spyware etc. Following are the result of Risk Assessment performed that will be used by Incident management group for activation of business continuity plan. Business continuity plan is develop to mitigate threats that have low probability of occurrence but high impact. ...
Download paper
Not exactly what you need?

Related papers

Outsourcing Supply Chain Support and its Effectiveness and Implication in R&D Environment in Singapore
The interviews of the employees of i3lab revealed that there were concerns about security and integrity of the information that is being shared with the outsourcing partners, and this leads to an inherent reluctance in sharing sensitive information. The research also included interviews of employees from three outsourcing partners of i3lab and it was found that lack of communications, lack of…
Vulnerability Assessment
I performed this security check in collaboration with Securex security firm Premier commercial bank is one of the largest asset financed bank in the region that has a broad customer base across the region. The bank deals in so many transactions and they are as outlined; depository transactions, withdrawal transactions, credit advancement services, Personal and business loan services, mortgages…
Read Ch. 11 and the Resource section in the book Creating Graphics for Learning and Performance
The standing out of the information improves leaner selection. Contrast can be used to help the leaner distinguish between information that is important to the one that is less important. Two color schemes are very important in the perception and visual acuity of the learner. The two schemes divide the color wheel in two halves, which are the warm and cool color and the spectral scheme. Colors…
EA Enables Process Paper
In this scenario, the basic purpose of implementing EA in an organization is to identify how an organization can most efficiently and successfully attain its current and future goals (TechTarget, 2005; NIH, 2011). This paper presents a detailed overview of enterprise architecture (EA). This paper will discuss how enterprise architecture works, and its support and capabilities for the businesses.…
the history and the future of GPS
The GPS IIF is the expanded version of GPS IIR (M) which will be consisting of 12 satellites altogether the third of which is launched in the current year. Another series of GPS Block III is under development process which would be able to give more powerful signals and better (PNT). The Global Positioning System provides information related to time and location. It is a satellite navigation…
Air Crash Investigation
This report also aims in making recommendations for improving the system and reducing the failure rates. Table of Contents ABSTRACT 1 1.0 Introduction 4 2.0 Description of the Accident 5 3.0 Narrative of Events 5 4.0 Structure of Investigation Report 6 4.1 Executive Summary 7 4.2 Factual Information 7 4.2.1 Mission 7 4.2.2.
Security Audit
Also, some team members violated integrity and confidentiality assertions by disclosing information to external parties. This paper entails the details and implications of security audit procedures carried out and observations noted. Conducting audit Lafleur has a complicated network of information systems in place, with various remote offices and centralized IT function. Therefore, to evaluate…