logo

ITC 596 -IT Risk Management | Assignment

   

Added on  2020-03-03

8 Pages1569 Words49 Views
Running head: IT RISK MANAGEMENTIT Risk ManagementName of the studentName of the UniversityAuthor Note

1IT RISK MANAGEMENTTable of ContentsIntroduction......................................................................................................................................2IT Security and Technology Landscape......................................................................................2IT Security Models and Access Controls....................................................................................3IT Security Threat and Risk Assessment.....................................................................................4Conclusion.......................................................................................................................................5References........................................................................................................................................6

2IT RISK MANAGEMENTIntroductionThere is always a need for the implementation of an effective risk management process inevery organization irrespective of any industry. The aim of the risk management process is toprotect the organization and help it to achieve its objectives (Reason, 2016). IT risk managementdeals with the proper application of the principles of risk management in IT industry (McNeil,Frey & Embrechts, 2015). The security in IT has a relation with the access controls of thedifferent subjects. The IT security model is the specification and enforcement of the differentsecurity policies. The report takes into account the threats of security in IT and the ways to assessthe risks, the security models, access controls and the technology scenario. IT Security and Technology LandscapeThe security of information and data is very significant for any type of organization sincedevices contain many personal and official data that cannot be shared by everyone (Witten et al.,2016). It will be a huge loss to an individual or any organization if any data is stolen or lost. Thishas enabled the companies to think about the various IT security policies and technologies. Thissecurity can be restored by not giving unwanted access to any users. The security of informationand computing system covers a wide area within an organization. Lack of proper understandingof the areas and the security levels of the different devices, protocols, applications, hardware andoperating systems may cause security vulnerabilities that are having chances of affecting theorganization. Two significant factors in the security of the information are the security model and thesecurity policy (Siponen, Mahmood & Pahnila, 2014). The security model defines an outline asto how the security measures will be implemented. It provides a blueprint and architecture of the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ITC596 - It Risk Management
|10
|1552
|83

IT Risk Management : Assignment
|7
|1669
|112

Concepts of IT Security and the Technological Landscape Model Report
|7
|1248
|54

BUSI 414 - UT Security and Risk Assessment
|9
|1437
|83

IT Security & Technology Landscape : Assignment
|10
|1862
|58

IT Security and Risk Management | CNSS Security Model
|6
|1362
|197