logo

Cyber Security: Risk Assessment, Information Assets, Threats and Risk Matrix

   

Added on  2023-05-27

10 Pages1693 Words388 Views
Running Head: CYBER SECURITY 0 | P a g e
Cyber Security
Individual task
Student name

Cyber Security 1 | P a g e
Contents
TASK – 1.........................................................................................................................................1
TASK - 2..........................................................................................................................................1
TASK - 3..........................................................................................................................................2
TASK - 4..........................................................................................................................................2
References........................................................................................................................................3

Cyber Security 2 | P a g e
TASK – 1
Risk assessment is a process in which find the assets of an organization, which are affected from
the outside attacks. In case of cyber security, the identification of assets, which are affected from
the cyber-attacks, such as Privacy, data security, softwares, hardware. Based on these assets
could find the risks for the organization (ACSC, 2017).
Identification of risks in an organization is a tough process on the bases of their assets. There are
so many types of failures and faults in the system because of the virus, worms, and threats. There
are so many malwares, which affects the system from different sources. They may be harm
hardware or softwares of the organization (Rouse, 2013). On the bases of risk assessment, every
organization can characterize the system working; it can be change the processes, functions of
the systems according to the risk assessments.
According to my opinion, it is also beneficial for the identification of the threats for the system
of organization. Based on risk assessment, system can determine inherent risk and impacts of
different risks. Risk assessment is helpful for customization of control environment. There are
different controls according to risks in the system to the assets of an organization. There are few
different types of rating provided to the risks and based on them, administrator can take actions
for that threats. It is divided into three categories basically, which are high, medium, and low.
Basic risks of an organization from cyber-attacks are unauthorized access in to system, misuse of
information, data leakage, process failure, Loss of data, and service disruption. They all are
affected productivity of a system (Arlitsch & Edelman, 2014).

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Risk Analysis and Management: A Comprehensive Guide
|20
|2542
|272

Cyber Security Assessment 2022
|10
|2116
|38

Cyber Security And Assessment of Risk
|10
|2256
|21

Cyber Security 2022 Assessment
|9
|1875
|36

Importance of Risk Assessment in Cybersecurity for Universities
|9
|2039
|122

BYOD Implementation and Risk Management
|11
|2509
|384