logo

Information Security Management

   

Added on  2023-01-19

9 Pages2997 Words41 Views
Running head: INFORMATION SECURITY MANAGEMENT
Information Security Management
Name of the Student
Name of the University
Author Note:

1INFORMATION SECURITY MANAGEMENT
Table of Contents
Introduction.................................................................................................................................................2
Risk assessment...........................................................................................................................................2
Owner Specification................................................................................................................................2
Asset Classification..............................................................................................................................3
Threat for asset...................................................................................................................................4
Vulnerability of asset..........................................................................................................................4
Likelihood level Computation.............................................................................................................5
Risk identification with risk level.............................................................................................................8
Conclusion...................................................................................................................................................9
Recommendation......................................................................................................................................10
References.................................................................................................................................................11

2INFORMATION SECURITY MANAGEMENT
Introduction
The following report is all about conveyancing and real estate organization named CONVXYZ
which is based in United Kingdom. The organization is planning to set up their IT network and system.
The organization aims to provide real estate service for both property buyers and vendors(Peltier 2016).
The main notion of security system is all about preventing or reducing the business loss that is caused as
a result of possible incidents. The situation can be any one of the following like stealing information,
modification of data, deletion and destruction. It is mainly inclusive of large number of things scam
which has many victims. This particular organization comes up with a website where the client of the
organization can easily look for property details and can easily contact for estate agents (Soomro, Shah
and Ahmed 2016). After making a registration to the conveyancing service, customers can easily get the
details of the account that is username and password to the website. For this report, we are going to
use checklist method of risk assessment. This particular risk assessment methods can provide a range of
benefits like identifying security vulnerabilities, making smart purchase, improved planning and many
other.
In the coming pages of the report, a risk assessment has been done where the specification of
the owner has been discussed in details. Both kind of assets that is primary and secondary has been
discussed in brief. One threat and one vulnerability for each of asset has been discussed in brief. After
that the likelihood level of computation has been done by making used of Boston grid.
Risk assessment
Owner Specification
UK based CONVXYZ organization is focusing on to hire team by which they can set up their IT
network. The real estate organization aims to provide real estate services for both property vendors and
buyers. The service is mainly employed by different kind of lawyers. The main notion of the organization
is to reduce the overall loss which is caused due to possible incident. The main focus of authenticate
server is to authenticate the username and password for both customer and staff members (Safa et al.
2016). At the time of authenticating of task, the server needs to communicate at both end that is
database of staff and server where all the required information is stored. By the help of proper
authentication, both customers and staff can easily access the property details and present
documentation. The organization makes use of employees like lawyers, real estate agents where they
can make use of system for login into the website of the organization or even browse for internet
services (Hoffmann, Kiedrowicz and Stanik, 2016). In this organization, prior to any kind of exchange
between the buyer and vendor, buyer needs to request for money to the bank account of this real
estate organization. All the details like bank account number is provided by the help of email and post.
Asset Classification
In CONVXYZ organization, primary asset can be stated as the asset which needs to be
incorporated in the begin for importing certain kind of assets. Primary asset can state as the default kind
of scope which is needed for importing other kind of asset (Safa, and Von Solms 2016). There are certain

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Management
|11
|3202
|65

Information Security Management: Risk Assessment and Recommendations
|11
|2902
|54

Risk Assessment on Network of CONVXYZ
|16
|3227
|104

Risk Assessment for CONVXYZ
|12
|3189
|82

Risk Assessment for CONVXYZ Organization
|12
|2947
|68

Management of Information Security
|15
|2804
|294