logo

Information Technology and Risk Assessment Report

This assignment requires students to do a 5-10 minute presentation on a recent academic paper on a topic related to IT Security.

10 Pages2137 Words431 Views
   

Added on  2022-10-05

About This Document

This report outlines the vulnerabilities in the information management system and provides solutions to make it more secure. It covers risk assessment methodology, testing methods, potential threats, and more.

Information Technology and Risk Assessment Report

This assignment requires students to do a 5-10 minute presentation on a recent academic paper on a topic related to IT Security.

   Added on 2022-10-05

ShareRelated Documents
Information Technology and Risk Assessment Report 1
Information Technology and Risk assessment
Affiliate Institution
Student
Date
Information Technology and Risk Assessment Report_1
Information Technology and Risk Assessment Report 2
Table of Contents
Introduction.................................................................................................................... 2
Purpose......................................................................................................................... 3
Scope........................................................................................................................... 4
Testing methods.............................................................................................................. 4
Risk assessment methodology............................................................................................. 4
System description........................................................................................................... 5
Information management system...........................................................................6
Responsible team.................................................................................................... 6
Potential threats...................................................................................................... 6
Conclusion.................................................................................................................. 7
Information Technology and Risk Assessment Report_2
Information Technology and Risk Assessment Report 3
Introduction
Most of the companies experiences high risks because of the constant advancement in
technology. They feel that their data are not safe on the internet. This is because hackers have
become a problematic as they are ever busy working round the clock to ensure that they still
from these companies. [16]However, Risk Assessment and Risk management is an important
tool which can help in ensuring that all the company information remain safe. In IT security is
the most important factor to be considered. This days, most companies have migrated most of
their data and information into the cloud. Cloud computing is a working technology which has
really made all things possible. [16] Our data are stored over the space and hence a step in data
security has been achieved through this feature
However, data backup as a form of data security has been achieved, but hacking remains a major
threat as most of the data has been just exposed all over the internet. This data may be sniffed or
spoofed by hackers from the space. So it is still a bigger challenge whatsoever.[5]
Risk assessment and Risk management will help to ensure that:
The application are provided with enough security level of protection for IT systems
To ensure that the IT systems meet the ISO standards
The company is fully satisfied with the IT system and provide a very user friendly IT
environment.
The acceptable level of risk is met. [14]
The risk assessment report clearly describes the information management system in which the
company is using to manage its customers and the members of the staff. [10]The system can be
any IT application which the company is using to ensure that the management processes are
Information Technology and Risk Assessment Report_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Services in Risk Assessment 2022
|5
|1151
|26

Security threats in cloud computing and preventive methods
|9
|2288
|116

Risk Assessment Report- Docs
|11
|1091
|30

Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Report On Cloud Computing Security | Data Protection
|9
|2109
|168

Cloud Storage Adoption Analysis 2022
|18
|4488
|51