logo

Risk Assessment

This page contains the Learning Resources for this week. Be sure to scroll down the page to see all of this week's assigned Learning Resources.

6 Pages711 Words75 Views
   

Added on  2022-11-30

About This Document

This report evaluates risks, justifies selected threats, enhances data security, and discusses risk assessment in the context of security governance.

Risk Assessment

This page contains the Learning Resources for this week. Be sure to scroll down the page to see all of this week's assigned Learning Resources.

   Added on 2022-11-30

ShareRelated Documents
Running head: RISK ASSESSMENT
RISK ASSESSMENT
Name of the Student
Name of the University
Author note
Risk Assessment_1
1
RISK ASSESSMENT
Table of Contents
Introduction......................................................................................................................................2
Discussion........................................................................................................................................2
Conclusion.......................................................................................................................................3
References........................................................................................................................................4
Risk Assessment_2
2
RISK ASSESSMENT
Introduction
This report will help in proper evaluating of the risks that might be occurring. Proper
justification of the selected threats will also be stated. Standards that will be required for
establishing secured data set will also get enhanced. Proper communication process that will be
used for sending the message to the managers is also stated. Risk assessment is also stated in this
report.
Discussion
Security governance
IT security governance is the system via which the entire controlling of the IT security
processing can be performed. Mitigating risks has been a major instance that will include proper
decision making regarding risk mitigation process. This section of security governance is
concerned with the processing of the accountability framework for performing decision making
process. Security strategies are specifically aligned with the business objectives. This is the main
aspect that processing of the business organizations implement security governance in execution
of their business (Mann 2017).
Evaluate threats against organization resources
The threats that are present in the commencing of the project includes Confidentiality
issue, Integrity issues and Availability issue. Confidentiality issue includes preserving of
authorized restriction of information access and disclosure of the same. Protecting personal
privacy has also been leading to proprietary information. In case of the integrity issue the main
concern that is considered includes issues that are present in the processing of protection of
Risk Assessment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Comparison of Governance Models | Report
|8
|1359
|20

Importance of Cyber Security Risk Management in E-commerce Companies
|4
|729
|432

IT Security Risk Assessment
|13
|2259
|16

Casestudy Of Governance In The Financial Sector
|21
|5669
|21

Cyber security Planning and Compliance (pdf)
|11
|3109
|30

Security Management and Governance
|5
|715
|454