logo

Risk Assessment Cybersecurity Report 2022

   

Added on  2022-09-21

11 Pages1696 Words23 Views
Running Head: Cybersecurity 0
Cybersec
urity
Report
Student name

Cybersecurity 1
Table of Contents
Task -1........................................................................................................................ 2
Task -2........................................................................................................................ 2
Task -3........................................................................................................................ 3
Computer Virus....................................................................................................... 3
Malfunctions............................................................................................................ 4
Phishing................................................................................................................... 4
Vandalism............................................................................................................... 4
Task -4........................................................................................................................ 6
References................................................................................................................. 8

Cybersecurity 2
Task -1
Risk assessment is a process in which all the vulnerabilities and threats has founded
by the security manager to create various controls of that particular risk based on
the risk of that particular threat. Risk assessment is necessary because there are
various capabilities that have been presented in the network, which can be
accessed by the hacker (ACSC, 2019). Therefore, it is necessary to identify all the
threats and vulnerabilities of the whole IT infrastructure to reduce the risks of
damage to various things, such as information assets, reputation of firms, and many
others. It is a tough process because identification of vulnerabilities is not an easy
task. Therefore, whole systems must test using particular testing tools and identify
the loophole in the network and infrastructure. In addition, the results of risk
assessment can be used in development of controls and manage security of the
whole IT infrastructure. Moreover, it can affect the business decision-making
process because wrong data can provide wrong decisions for an organization (ACSC,
2017).
Furthermore, cybersecurity is necessary for securing all the information assets of
the company because all the data and information are valuable for the company in
the decision-making process. In addition, various risks can be reduced using
cybersecurity and risk assessment. However, some vulnerability is always present
in an IT infrastructure because of human mistakes and other issues. There are many
other issues are related to cybersecurity (Andrijcic & Horowitz, 2016).
Task -2
There are five questions in mind related to the information assets, which areas:
What is an information asset?
What is the role of information assets in an organization?
What is a critical information asset of an organization?
What is the reason behind the security of information assets of an
organization?
Why an information asset has required security?

Cybersecurity 3
An information asset is a valuable thing, which can be used for the organization,
such as personal computers, internetworking devices, software, hardware, data,
and information, and many more. In addition, information assets are also important
for the organization, as they are used in various business functions of the company,
such as sales, marketing, accounts, HRM, and many more (Barkly, 2018).
There are some information assets critical because of their role in an organization,
such as data in the data center, network of the company, server configuration, and
many others. There are some important assets of a company, which are based on
all the processes, such as software, network, hardware, people, and many more.
There are many advantages to the security of information assets, such as financial,
reputation, and many others. In addition, the company can manage its various
internal processes securely using proper management of security policies and other
things (Bhagat, 2012). WFA template can include these particular information
assets in critical assets based on their ranks, as an example,
Rank of
Information
Asset
Name of the
Information
Assets
Risk of the losses Remarks
Task -3
Security is necessary for the whole system, but information assets have required
more security from many types of attacks. Identification of threats is a tough
process for a person. In addition, tools and techniques are available for finding
threats of information systems (Cherdantseva, et al., 2016). Cybersecurity is
necessary to resolve those issues and threats as well as risks of the organization. In
addition, an organization must secure their website using cybersecurity for their
business as well as reputation in the market (Lord, 2019).

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Pen test and BIA Report
|18
|4153
|192

Cyber Security Management Report 2022
|17
|2393
|34

Importance of Cybersecurity
|3
|501
|340

Cybersecurity Assignment 2022
|12
|3058
|22

System Security Management
|6
|1504
|37

Cyber Security: Risk Assessment, Information Assets, Threats and Risk Matrix
|10
|1693
|388