logo

Assignment on IT Security pdf

This is an assignment brief for the Security unit in the BTEC HND in Computing program. The assignment requires the submission of a security-related assignment by the given deadline. Feedback will be provided within 2-3 weeks of submission.

9 Pages1771 Words346 Views
   

Added on  2020-12-26

Assignment on IT Security pdf

This is an assignment brief for the Security unit in the BTEC HND in Computing program. The assignment requires the submission of a security-related assignment by the given deadline. Feedback will be provided within 2-3 weeks of submission.

   Added on 2020-12-26

ShareRelated Documents
IT Security
Assignment on IT Security pdf_1
Table of ContentsINTRODUCTION...........................................................................................................................1LO3..................................................................................................................................................1P5 Risk assessment Procedure.....................................................................................................1P6 Evaluating the data protection process and regulation as applicable to the organization......2LO4..................................................................................................................................................2P7 Designing and implementing the security policy for the retailing business...........................2P8 Identifying the main components of disaster recovery plan along with the reason................3CONCLUSION................................................................................................................................4REFERENCES................................................................................................................................5
Assignment on IT Security pdf_2
INTRODUCTIONIT security is a set of cybersecurity strategies that prevents unauthorised access toorganizational assets which includes computer, network and data. IT security mainly maintainsthe integrity and confidentiality of sensitive information, blocking the access to sophisticatedhackers. This study will help in providing the better IT solutions for the retail organization whois going to expand the business in an online platform. Moreover, The report will also help in identifying the different types of security riskinvolved in an organization. It will also helps in identifying the potential impacts of the incorrectfirewall configuration and Third party VPN's. This study will also make a clear understandingabout the Control mechanism In order to control the organization IT security.LO1 & LO2 are covered in PPTLO3P5 Risk assessment ProcedureAn information security risk assessment procedure is the process of identifying, resolvingand preventing the security problems within the business. Ris assessor will helps in identifyingthe the risk which is involved in securing the IT solutions within the business. This procedurehelps in analysing the risk involved in the retailing business (Bada, Sasse and Nurse, 2019). Thisis often a asset based, where risks are generally assessed according to the information regardingthe assets.ISO 27001 have prescribed a risk assessment methodology for the business which helpsin defining the rules by which t he IT manager will perform the risk assessment. Thismethodology needs to address four issues such as Baseline security, criteria, risk appetite,scenario based, asset based risk assessment. Risk assessment procedure includes :Identification of the hazardEvaluating the harmful effects of the hazards and its impacts on specific system Evaluation of the risk and various control measuresImplementation of the strategies accordingly and recording the appropriate findings.P6 Evaluating the data protection process and regulation as applicable to the organizationThe general data protection regulation is a legal regulation according to the EU law ondata protection and privacy for all the individuals. This is the legal framework that sets the11
Assignment on IT Security pdf_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
OWASP Risk Assessment Framework
|21
|2606
|14

iT Security
|17
|5127
|60

IT Security Risk Assessment
|13
|2259
|16

Risk Management: Standards, Guidelines, and Procedures
|7
|1381
|96

BSBWOR501 Managent risk
|12
|3520
|1

Computer Information System
|14
|3526
|496