Cyber Security Assessment 20222

   

Added on  2022-10-06

9 Pages1846 Words19 Views
Running head: CYBER SECURITY
CYBER SECURITY
Name of the Student:
Name of the university:
Author Note:
Cyber Security Assessment 20222_1
CYBER SECURITY1
Table of Contents
Significance of the risk assessment........................................................................................................2
Critical asset identification....................................................................................................................2
Template................................................................................................................................................3
Associated threat identification.............................................................................................................4
Landscape of the threat imposed on the website....................................................................................4
References.............................................................................................................................................6
Cyber Security Assessment 20222_2
CYBER SECURITY2
Significance of the risk assessment
There are several vulnerabilities associated with a particular procedure that enhances the
exposure of the system to possible risks and threats. Therefore, these risks are equipped with
potentials that facilitates the procedure to cause harm to the system, as a consequence these
vulnerabilities are malicious for the system. Risk assessment deals with this scenario of identifying
the possible risks that may creep into the system at any point of time, addressing them and providing
necessary resolutions that are in the line of alignment for combatting the same (Arachchilage and
Love 2014). Risk assessment associated with cyber-security is also no exception to this generalised
perception. Cyber-security risk assessment procedure successfully identifies the risk, critically
analyses them and finally evaluates the weightage of the associated risks.
Risk assessment that is in the line of alignment of cyber security, thoroughly identifies the
scenarios where the assets and liabilities of the system are exposed to get affected by the profound and
impacting cyber-attack. This is likely to bring about drastic alteration in the infrastructure of the
system incorporating the constituents like software and hardware components, database retaining the
student data and computer systems (Conteh and Schmick 2016). There are several challenges
associated with the impart of education to the team in regards to the risk mitigation techniques.
For the maintenance of proper balance within a system, it is very crucial to thoroughly
evaluate the anticipated risks and critically estimate the vulnerabilities that lead to the evolution of the
risks and at the same time adopting the necessary mitigation techniques that will be employed for the
purpose of mitigation of the same. For the accomplishment of this purpose it is very crucial to review
the operations and monitor the ambience of the educational institute, responsible for the detection of
the drastic changes that are witnessed within the structural framework of the organization in due
course of time.
Critical asset identification
Cyber Security Assessment 20222_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber security - Assignment PDF
|11
|2072
|1067

IT RISK MANAGEMENT Case Scenario: Big Data Security
|13
|2769
|478

Cybersecurity Threat Model Report
|10
|1987
|460

Risk Assessment in Cyber Security - Importance, Difficulties, and Vulnerabilities
|9
|1440
|388

Organizational Readiness and Risk Assessment for ISO 27001:2013 Certification
|9
|1054
|440

Creation of a Cyber-Security Program
|15
|2625
|17