Overview of IS risk Assessment Part 11 - Research Paper Example

Only on StudentShare

Extract of sample
Overview of IS risk Assessment Part 11

The second step is to take the asset owners on board and define an asset classification scheme. This asset classification scheme defines the severity of all assets along with a value. This value will identify information assets connected on the computer network. Three of the important aspects that make the risk management framework recognizable are vulnerabilities, threats and exploits. Vulnerabilities are defined as weaknesses in a system, network, workstation, or server. This weakness can be exploited by a virus, Trojan, work, malware etc. Likewise, vulnerabilities are not inherent, as they can be created by poorly managing patch management procedures, operating system critical updates procedures, virus definition updates procedures, no adequate rules on firewall etc. These vulnerabilities can be exploited by threats such as a weak hole in an operating system can be exploited by a worm or virus attack. Threats are the known viruses, Trojans, root kits, malware, adware, spyware etc. Following are the result of Risk Assessment performed that will be used by Incident management group for activation of business continuity plan. Business continuity plan is develop to mitigate threats that have low probability of occurrence but high impact. ...Show more


Full Paper Title Name University Risk Assessment Computer network risk Assessment framework takes a holistic approach for accessing risks, threats and vulnerabilities of the organization’s information technology architecture. Likewise, this essential function incorporates a risk management framework led by a steering committee…
Author : monty58
Save Your Time for More Important Things
Let us write or edit the research paper on your topic
"Overview of IS risk Assessment Part 11"
with a personal 20% discount.
Grab the best paper

Related Essays

Outsourcing Supply Chain Support and its Effectiveness and Implication in R&D Environment in Singapore
The research includes interviews of employees from three outsourcing partners of i3lab and it was found that lack of communications, lack of protocols for facilitating the information sharing between the partners was a cause of low standardization, loss of quality and increased costs due to delays and re-works.
56 pages (14000 words) Dissertation
Security Assessment Check For Premier Commercial Bank
Based on this research security assessments refer to conducting vulnerability tests and assessments tests on business or any working environment in order to keep its networks protected. A security assessment may be performed by an IT or internal security expert or through the use of hiring security firms to check for any loopholes in the current security procedures.
13 pages (3250 words) Essay
Read Ch. 11 and the Resource section in the book Creating Graphics for Learning and Performance
Choosing color for instruction depends on three main principles namely; selection, integration, and organization. The three principles are explained in depth below. Selection The colors to be used must make important information that is to be conveyed stand out.
5 pages (1250 words) Essay
EA Enables Process Paper
In fact, the enterprise architecture defines the way how information technology will be used in an organization to support the business operations and offer assistance to the business. Basically, enterprise architecture is a theoretical framework that outlines the entire structure and operations of a firm.
3 pages (750 words) Essay
The history and the future of GPS
It is owned and maintained by the US Air Force; however, its user segment is available to the civil authorities as well. It is used to know about the positioning, navigation and time (PNT). GPS started its operations in 1994 since then it has been modified on continuous basis.
5 pages (1250 words) Research Paper
Air Crash Investigation
The investigation conducted by National Transport Safety Board revealed that the crash was caused due to disintegration of horizontal stabilizer as a result of adherence to poor maintenance procedures and quality assurance. The purpose of this research work is to study and evaluate the findings of the investigation report and the significance of the recommendations with the existing regulations governing the operations.
15 pages (3750 words) Essay
Security Audit
Security audit refers to assessment of effectiveness of information systems and internal controls implemented by the company’s management. Several ethical issues are also faced during security audits such as role ambiguity existed between our team members during audit work causing conflicts and violation of hierarchy lines at times.
3 pages (750 words) Essay
Surf the Web
The reviewed websites include: university websites, American Cancer Association website, company websites, and State Education Boards (U.S) websites. Content divisions are structured according to the information that should reach the intended audience.
1 pages (250 words) Assignment
Manufactoring case study
However, in the process of punching papers up to 20 pages, the user exerts a lot of pressure. This may damage the lever of the paper pro hence it should be made stronger to withstand the force. Besides the lever, the
6 pages (1500 words) Case Study
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email