logo

Asset Security and Risk Management: A Case Study of CDU Systems

Create a report with recommendations/best practices to improve the security landscape of CDU systems

9 Pages1441 Words416 Views
   

Added on  2023-06-12

About This Document

This report discusses the identification of assets and risks associated with Charles Darwin University systems. It also provides recommendations for improving the security landscape of CDU system.

Asset Security and Risk Management: A Case Study of CDU Systems

Create a report with recommendations/best practices to improve the security landscape of CDU systems

   Added on 2023-06-12

ShareRelated Documents
Running head: ASSET SECURITY AND RISK MANAGEMENT
Asset Security and Risk Management: A Case Study of CDU (Charles Darwin
University) systems
Student Name:
University Name:
Asset Security and Risk Management: A Case Study of CDU Systems_1
1ASSET SECURITY AND RISK MANAGEMENT
Table of Contents
Introduction......................................................................................................................................2
Identification of assets and risks......................................................................................................2
Asset Identification......................................................................................................................2
Risk Identification.......................................................................................................................4
Recommendations............................................................................................................................6
Conclusion.......................................................................................................................................7
Bibliography....................................................................................................................................8
Asset Security and Risk Management: A Case Study of CDU Systems_2
2ASSET SECURITY AND RISK MANAGEMENT
Introduction
Asset security and risk management are referred to as a very important mechanism for
any university to secure their credential from the external attackers (Layton 2016). It has been
identified that due to lack of managerial and functional operations the Charles Darwin University
is facing huge risks and the risks associated to the University are elaborated in this. On the other
hand, students and employee’s credentials are the most important asset for the University that
should keep safe and secured. The categories of the assets, details of the assets, their type and
owners are demonstrated in this report addition to possible treatments for all the identified risks.
Identification of assets and risks
Asset Identification
The assets has been categorized into main categories in context to CDU (Charles Darwin
University) as Equipment and Information. The assets identified are provided in the list as
below:
S No. Asset
Category Asset Details Asset
Type
Asset
Owner Comments
1
Equipment Violation of operating
procedures
Internal Operations The equipment
can be damaged
if the operating
principles of the
equipment are
violated
2
Equipment Malfunctioning of
software/hardware
Internal IT
Department
The software or
hardware may
malfunction thus
leading to faults
in the equipment
3 Equipment Theft of equipment External Resource
manager
There may be
loss of equipment
due to theft
which in turn
Asset Security and Risk Management: A Case Study of CDU Systems_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Asset Security and Risk Management for Charles Darwin University
|8
|581
|475

Risk Assessment for Information Technology, Human Resource, and Network Infrastructure
|3
|840
|79

Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375

Corporate Insider Threat Detection - Research Proposal
|15
|3361
|223

Physical Security Measures: A Case Study of Extreme Corporation
|12
|1005
|438

Security: Protecting Information Systems and Data
|14
|2209
|498