logo

IT Risk Management in Organisation

   

Added on  2020-03-23

18 Pages4937 Words34 Views
Running Head: IT Risk ManagementIT Risk Management ofAztekOperations in Australian Financial ServiceSectorTable of ContentsExecutive Summary...............................................................................................................................2Introduction to the Risk Management of Aztek.....................................................................................2

1Risk Management in an OrganisationIT Security Policies and procedures.......................................................................................................3The Main Policies and the Procedure to be followed:.......................................................................4IT Control Framework............................................................................................................................6Operations in outsourcing key IT functionality in risk management.................................................6The main Principles used for controlling the framework...................................................................7Data Security in an Organisation...........................................................................................................8Migrating of Database.........................................................................................................................10The four basic components of migrating of the database:..............................................................11Strategies Used for Mitigation.........................................................................................................11Database Security Best Practices of Aztek Organisation......................................................................12Conclusion...........................................................................................................................................13References...........................................................................................................................................14

2Risk Management in an OrganisationExecutive SummaryThe main framework of the company has initialised with the disaster risk management whichis been rising in the threats been occurred in the company. The research made on the disasterhas been wide spread on the main impacts caused not only on the database but also on theinfrastructure of the organisation and the management of the IT. This leads to the big impacton the big loss been occurred in an organisation which tends to recover all the disaster beenoccurred so as to continue the all the business activities of an organisation. There should bethe systematic way for implementing the strategies to avoid the risks so as to continueprocessing the business activities. It is very essential to understand and develop the ideas forworking on the management strategies. This project is been made on outsourcing the key ITfunctionalities which is being used for developing of an applications as well as theperformance made and development of applications with the third party and functionality andoperations performed on networks and maintaining the organisation behaviour of an Aztekcompany (Alhawari et al., 2012).Introduction to the Risk Management of AztekRisk is often been termed as the disaster or the malicious activities which is being present asthe undesirable form of an activity been occurred. The activity which is being occurred as thevulnerable event and the threats which are being occurred as the expected harm which isbeing occurred in an organisation which is used to combine all the risks and the threatsoccurred into an organisation to set the risk for the regret and the remuneration on theprobabilities based on expected outcomes. The application used for managing the risks in andorganisation to prevent and to overcome from the malicious and harmful activities whichmainly affect the main part of an organisation i.e. the whole infrastructure of an organisation(Aubert et al., 2005). The business risk is been linked with the ownership, operational

3Risk Management in an Organisationactivities, regarding the investment made with involvement of IT in an Organisation. It isusually based on the risks been performed on the on-going basis. It is critical to examine therisks and the threats being occurred in an organisation so as to prevent and to continuouslyprocess all the business activities. It is the complete approach to all the IT security and therisks management to cover the entire model of the business risks and management that isusually used for the identification of the security-related business to overcome from all therisks and for working on this it is essential to teach the employees working in an organisationso as to have a proper guidance on the security and the main objectives to be worked on andto have a proper security and network architecture (Benaroch et al., 2007). It security allowsthe clients to update and improve the security risks management and the strategy which isbeing used for continuing all the organisational activities and use the latest technologies toraise the data information and the protection to mitigate the current risks and threats.IT Security Policies and proceduresThe resources which are being used in the organisation to have a strict security measures toprevent and to overcome form all the problems. The inward and outside dangers to thesecrecy, uprightness, and accessibility of these assets have expanded. Security breaches in anorganisation are the most popular targets that have increased to destroy the IT architecture ofan organisation. They mainly target on the business transaction of an organisation, theemployee database, client database and organisational personal data. It is essential for everyorganisation to overcome from the threats and to protect from the intrusions and wrong utilizeor divulgence (Benaroch et al., 2006). All the systems of an organisation should be daily orweekly updated and maintained so as to overcome and have the prevention of the systemsfrom the intrusions and the malicious activities. The main purpose of the organisationregarding the IT securities and the procedures is to ensure all the responsibilities of an

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Risks Management of an Organisation Assignment
|21
|4910
|35

Migrating Business and Cloud Computing Assignment
|19
|6022
|37

IT Risk Management - Report (Doc)
|23
|6055
|34

Regulatory Measures and Best Practice
|20
|5821
|53

Report on IT Risk Management- Aztek Company
|21
|5513
|36

IT Risk Assessment Report for Aztek's Technology Decision
|2
|990
|458