logo

IT Risk Assessment and Cyber Security Lead Consultant for Gigantic Corporation

10 Pages3551 Words91 Views
   

Added on  2020-05-28

About This Document

Therefore, it becomes utmost essential to take proper measures in ensuring proper online security and privacy of all the systems within running within the organization. The project aims at developing a secure system within the organization and therefore, proper risk evaluation strategy is necessary. In order to design an effective intrusion detection system, it becomes utmost necessary to identify and evaluate all the possible risks associated with the system.

IT Risk Assessment and Cyber Security Lead Consultant for Gigantic Corporation

   Added on 2020-05-28

ShareRelated Documents
Running head: IT MANAGEMENT-CYBER SECURITY IT Management-Cyber SecurityName of the StudentName of the UniversityAuthor Note
IT Risk Assessment and Cyber Security Lead Consultant for Gigantic Corporation_1
1 IT MANAGEMENT-CYBER SECURITYTable of ContentsExecutive Summary.............................................................................................................2Risk Assessment..................................................................................................................3Risk Register....................................................................................................................3Protection mechanism..........................................................................................................7References............................................................................................................................8
IT Risk Assessment and Cyber Security Lead Consultant for Gigantic Corporation_2
2 IT MANAGEMENT-CYBER SECURITYExecutive SummaryAs an IT risk assessment, lead consultant for Gigantic Corporation for cyber security. Theorganization deals with many online activities including regular data back up in cloud.Therefore, it becomes utmost essential to take proper measures in ensuring proper online securityand privacy of all the systems within running within the organization. This includes protection ofinformation privacy of the employees as well. The project deals with the development of properplan in order to implement the security system across the organization. The project is complex,as every associated risk lingering over the present systems of the organization is needed to beidentified and mitigated. The report discusses the possible threats the system could face due totheir online operations. Assessment of the identified risks is provided in the report along with therecommendations for risk mitigation. The IT risk assessment report consists of the details of thethreats; the systems are exposed to along with the proper evaluation of the risks. The projectaims at developing a secure system within the organization and therefore, proper risk evaluationstrategy is necessary. The project can only be successful if the systems of the GiganticCorporation are deployed with proper intrusion detection system. In order to design an effectiveintrusion detection system, it becomes utmost necessary to identify and evaluate all the possiblerisks associated with the system. Ensuring cyber security in an organization is a complex task. Itstarts with proper identification of the domain or the areas of vulnerability, understanding thevectors, tools and mechanism of exploitation and their resulting impact on a system. Properanalysis of these factors helps in proper identification of associated risks in a system. Theidentified risks then should be properly management in order to successfully complete theproject that deals with establishment of secure network and computer devices within theorganization. However, this needs a proper plan and a considerable amount of time in order toevaluate properly the threat agents and the outcome of the threats associated with the systemsinstalled within an organization. One of the biggest threats that every organizations are exposedto is an insider threat. It is a major concern because threat insider is difficult to detect andtherefore the cyber crimes from an insider threat is more costly and damaging from an externalthreat. Those employees of the organization, who have an access to the secure and confidentialdata of the organization, can only carry out insider security breach. The outside threats includecompromising the systems or the network by the cyber criminals. One of the prominent externalattacks in the organization is phishing. It is a targeted attack and a fraudulent practice of sendingspam emails to the different individuals with an aim of revealing their personal information. Thereport is mainly based on the risk assessment matrix that is identified for the systems and thenetwork of Gigantic Corporation. The different types of vulnerabilities and the threats in thesystem are identified so that it can be eliminated from the system. The report further discussesthe different protection mechanisms that can be employed within the organization in order toensure proper security of the data.
IT Risk Assessment and Cyber Security Lead Consultant for Gigantic Corporation_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Assignment - Gigantic Corporation
|13
|5221
|102

Risk Assessment based on Cloud Security
|11
|4088
|214

Risk Assessment based on Cloud Security
|13
|4730
|351

Cyber Security Assessment 20222
|9
|1846
|19

HI6008 - Business Research - Challenges in Cyber Security in Business
|10
|2609
|313

(PDF) Assignment on Cyber Security
|5
|856
|225