logo

Computer Information System

The assignment requires the submission of an individual written report, a policy document, and an individual written reflection. The written report should be concise and formal, with a recommended word limit of 2,000 words. The policy document should follow the same format as the written report. All work must be supported with research and referenced using the Harvard referencing system.

14 Pages3526 Words496 Views
   

Added on  2022-11-14

About This Document

This report deals with creating three-part engaging guidebook which needs to be completed. It provides an idea with respect to benefits of risk assessment procedure, GDPR, ISO 31000 risk management standard, impact of IT security audit, and alignment of IT security with organizational policy.

Computer Information System

The assignment requires the submission of an individual written report, a policy document, and an individual written reflection. The written report should be concise and formal, with a recommended word limit of 2,000 words. The policy document should follow the same format as the written report. All work must be supported with research and referenced using the Harvard referencing system.

   Added on 2022-11-14

ShareRelated Documents
Running head: COMPUTER INFORMATION SYSTEM
COMPUTER INFORMATION SYSTEM
Name of the Student
Name of the University
Author Note:
Computer Information System_1
COMPUTER INFORMATION SYSTEM1
Table of Contents
Introduction......................................................................................................................................2
Discussion........................................................................................................................................2
Benefits of Risk Assessment Procedure......................................................................................2
General Data Protection Regulation (GDPR)..............................................................................4
ISO 31000 Risk Management......................................................................................................5
Impact of IT Security Audit.........................................................................................................5
Alignment of IT security with organizational policy..................................................................7
Conclusion.......................................................................................................................................8
Part 2................................................................................................................................................9
Part 3..............................................................................................................................................10
Bibliography..................................................................................................................................11
Computer Information System_2
COMPUTER INFORMATION SYSTEM2
Introduction
The following report is all about IT security specialist who is working for a leading
security consultant. The report deals with creating three-part engaging guidebook which needs to
be completed. With every passing day, there has been growing news in media with respect to
security beaches in various organization. Security policy can be stated as a written document for
a firm that outlines the method of protecting the firm from threats. It is merely inclusive of
system-based threat and method of handling situation at the time of occurrence. This particular
policy is needed for identifying all the major assets of the firm along with potential threat for the
given asset. Organization need to update their security policies on regular basis.
In the coming pages of the report, an idea has been provided with respect to benefits of
risk assessment procedure. An overview has been provided about the fact that how data
protection like GDPR and ISO 31000 risk management standard can be applied to IT security.
Impact of IT security will have on the security of the firm. The last section of the report deals
with fact that how and IT security can be aligned to the organizational policy.
Discussion
Benefits of Risk Assessment Procedure
Risk assessment will help the firm to improve their overall security. With respect to in-
depth evaluation, it aims to offer various benefits which can be valuable for any firm.
Identification of Security Vulnerabilities: Risk assessment will help in evaluating the
firm system which is achieved by taking into account both external and internal environment.
Computer Information System_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Security Risk Assessment
|13
|2259
|16

Assessing Security Risks to Organisation
|21
|5004
|59

Assignment on IT Security pdf
|9
|1771
|346

Security policy development and risk management Report 2022
|13
|2914
|21

iT Security
|17
|5127
|60

Cloud Architecture Risk Assessment - ISO 27001 Standards
|15
|3032
|114