StudentShare solutions
Triangle menu

Security Risk Assessment - Coursework Example

Not dowloaded yet

Extract of sample
Security Risk Assessment

There are a variety of risks that a business organization faces when it comes to the implementation of a secure information technology system. This includes loss of information, an attack by internet or computer viruses and malwares, authorized use of data, etc (Vladimirov, Gavrilenko and Michajlowski, 2010). This paper analyzes the various elements that would make the computer system of a business organization to be vulnerable. It also examines the various measures aimed at protecting the computer system of a business organization.
A secure computer system must comprise of three major elements, namely recovery, resilience, and contingency (Calder and Watkins, 2010). Under resilience, the critical functions of a business organization and its supporting infrastructure are engineered and designed in a permanent manner. They are designed in a manner that it is impossible for any disruption to affect the functionality of these systems (Bradley and Carvey, 2006). It makes it likely for an organization to maintain its operations in case of a major threat or attack to its computer systems. For instance, a business organization may develop power back up systems, to protect the loss of data or their computer networks from going off, in circumstances where power fails to occur (Harrington, 2005). Business organizations may use solar gadgets and generators to protect their computer systems, in circumstances whereby power may fail.
Recovery involves restoring the important features of a computer system or network that failed to function (Bradley and Carvey, 2006). Computer experts may make arrangements aimed at recovering lost data, and making replacements on areas that is needed. This is to ensure that the activities of the business organization are not interrupted in any negative manner (Oppliger, 2000). Contingency involves ...Show more


Risk assessments are normally used for purposes of identifying any risks that business organization face, and this is in regard to their computer system (Calder and Watkins, 2010)…
Author : estelbednar
Security Risk Assessment essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the coursework on your topic
"Security Risk Assessment"
with a personal 20% discount.
Grab the best paper

Related Essays

IT security
nal data and information. It secures its confidentiality, accessibility and reliability. The role of information security for allowing access to the stored data and information on computer databases has augmented significantly over the past few decades. Additionally, a lot of businesses now store more and more customers and business data on computer systems that was not seen formerly.
10 pages (2500 words) Coursework
Risk Assessment Paper
This stage involves the collection of information regarding the imminent hazards associated with proposed solutions. The case presented in the Genericville City, needs insightful assessment of the risks involved through the use of Malathion in curbing the imminent mosquito nuisance.
4 pages (1000 words) Coursework
Risk and Mental Health
Inadequate handling of risks in such patients may not only lead to incidence of violence in in-patient scenarios but also escalate into such violent and mal adaptive patients' behaviour in community settings. In addition such patents tend to develop conditions like Acute Traumatic Stress Disorder (ATSD) or Post Traumatic Stress Disorder (PTSD) which makes them more dysfunctional and less adaptive to normal behaviour patterns.
32 pages (8000 words) Coursework
Security Management Market
The UK security industry was worth £4.37 billion in 2002, divided into electronic security £1.4 billion, physical security £331 million, police and public services £63 million and manned security £1.79 billion.
31 pages (7750 words) Coursework
Physical Security risk Assessment
Consequently, hardening also significantly describes the efforts made to make regular entry and access of build structures more channeled and resistant. Hardening is an expensive but worth
6 pages (1500 words) Coursework
Elements of Security System
When migrating to an email system that is cloud-based, updating security strategy would be important to avoid possible risks associated with the increase concern on hosted email services due to the associated benefits. This could be done by weighing the email services.
1 pages (250 words) Coursework
Information Security
Windrush ventures should see that it does not locate its data centre in the earthquake or flood-prone areas. Windrush Ventures has made no precautionary steps for those older and skilled employees who were about
11 pages (2750 words) Coursework
Security Risk Mitigation Policies
Despite the fact that the wireless networking provides numerous advantages, it is also coupled with various security threats which can alter an organization’s overall security profile. In the case of the wireless network bridge, there is need for effective management to the threats linked with wireless technology. Thorough and sound assessment of the risk provided in the environment should be done in order to develop a plan to mitigate it.
2 pages (500 words) Coursework
Health Risk Assessment Assignment
For instance, the tool considers the fact that men are a greater risk of getting a stroke more than women. The greatest determinant of the results obtained from the
5 pages (1250 words) Coursework
Risk Methodology
Risk methodologies generally provide laid down procedures or steps used to determine and manage the occurrence of unpredicted events. There are various risk assessment methodologies available and include:
4 pages (1000 words) Coursework
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation