logo

Analysis of Information Security Risk

   

Added on  2023-04-21

9 Pages1109 Words486 Views
 | 
 | 
 | 
Running head: ANALYSIS OF INFORMATION SECURITY RISK
ANALYSIS OF INFORMATION SECURITY RISK
Name of the Student
Name of the University
Author Note
Analysis of Information Security Risk_1

1
ANALYSIS OF INFORMATION SECURITY RISK
Initial structure of the IT Risk Management Strategy:
Type of leadership needed and persons to fulfil this role
Both transactional and transformational leadership style is required for
implementing the information security program (Warren 2017).
Transformational leadership style helps to identify threats to the information
security program and create response for plan for that (Reijonen et al. 2015).
Transactional leadership helps to analyze performance of the team members
through supervision and team organization and provide acknowledgement for that for
providing motivation and improving team performance (Bocken and Short 2016).
Types of leadership key persons for the role
Transformational leadership Security manager, cyber security
specialist, security officer
Transactional leadership Team leader and team director
Accountability for IT Security Risk:
The accountability for the IT security risk resides with each and every one
who is part of the information security policy and responsible for implementing the
policy within the organization (Laukkanen 2015). Accountability is an important part
for effective information security policy design and implementation as well (Dan
2015).
However according to Chan (2014) the chief information security officer has
the highest accountability for implementing the information security policy and risk
Analysis of Information Security Risk_2

2
ANALYSIS OF INFORMATION SECURITY RISK
management through proper identification of the risk within the system across various
risk category which has been described in the following section in details.
Types of categories of IT Security Risk that will be included and IT Assets that
would be included within each of the categories:
An analysis on the types of IT Risk associated with Security shows that there
are five main types of IT risks for the information security (Porterfield 2015):
1. Physical threats
2. Electronic threats
3. Technical failures
4. Infrastructure failures
5. Human error
In the following section IT assets have been included within each of the categories in
the table provided bellow:
Type of IT risks IT assets affected
Physical threats Network server might be hacked and it
often lead to loss of important
information though exploitation of
network server (Porterfield 2015).
Electronic threats Corporate website, business data ,
computer system
Technical failures Computer as a whole or part of a
computer component might crash for
bug in the software, hard drive and
Analysis of Information Security Risk_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents