logo

Aztek: IT Risk Management Bring Your Own Devices (BYOD)

20 Pages5080 Words285 Views
   

Added on  2019-10-31

About This Document

IT Risk Management at Aztek Aztek: IT Risk Management Bring Your Own Devices (BYOD) 9/22/2017 Executive Summary Aztek is a company that is based out of Australia and that provides financial activities to the users and its customers. There is an increase in the number of security processes that are set up to ensure that the organization is providing the best services to the users and its customers. There is an increase in the number of security processes that are set up to ensure that the organization

Aztek: IT Risk Management Bring Your Own Devices (BYOD)

   Added on 2019-10-31

ShareRelated Documents
Aztek: IT Risk ManagementBring Your Own Devices (BYOD)
Aztek: IT Risk Management Bring Your Own Devices (BYOD)_1
IT Risk Management at AztekExecutive SummaryAztek is a company that is based out of Australia and that provides financial activities to the users and itscustomers. The organization has been working for the users of Australia and beyond to provide them withthe best quality services. There are many new clients and partners that are now collaborating with Aztekwhich has brought additional set of services that need to be executed. In this phase of expansion, there aremany operational and information management issues that have been coming up. The management of thecompany has suggested many projects that may resolve such issues. The project that has been selected forimplementation is the Bring Your Own Devices (BYOD) and its inclusion in the organization. The reportcovers the organization and project overview along with its analysis from the financial aspect. Thechanges that the organization will bring to the organization in terms of the update of the strategy has beencovered and the project risks and risk management process. The types of information and theirmanagement from the security perspective have also been included. Findings and RecommendationsThere are many security threats and threats that are identified and described in the report with theimplementation of BYOD project (Cioupdate, 2016). Many different countermeasures are necessary to be implemented in order to ensure that the risks andattacks are avoided and prevented. These countermeasures are classified in three classes as administrativecontrols, technical controls and physical controls.The recommended controls under the category of administrative controls include the use of technology inthe form of administrative checks. There are validation and verification processes that shall be executedby the administration of Aztek by using technical tools as well. The management and administration mustcarry out verification techniques like reviews, inspections and control procedures by using automatedtracking tools and audit systems. There shall also be discussions carried out with the security team anddepartments so that the required updates can be done in the security strategy and policy followed byAztek. The second set of controls as countermeasures that have been recommended for Aztek include the use ofenhanced technologies. The first process shall be research and analysis of new technologies that can beapplied in the area of security. There are new concepts that have been invented in the area of technologysuch as business intelligence and Big Data. These technologies shall be used to improve the security, suchas, use of data analysis for analyzing the behavior of patterns and trends followed by attackers. There are2
Aztek: IT Risk Management Bring Your Own Devices (BYOD)_2
IT Risk Management at Aztekalso other technical tools that have been invented in the form of anti-malware and anti-denial tools.Advanced encryption tools along with many of the intrusion detection tools shall also be used. Physical controls are often not considered as applicable in the new-age business set-ups. It is because ofthe reason that there is an increased use of virtual technology and concepts in all the business units.However, the applicability of the physical controls shall also be considered and improved in Aztek for theprotection of information and devices. There shall be implementation of latest forms of authentication,access control and identity management that must be used and applied in Aztek. The use of all of these technologies and concepts in Aztek will strengthen the overall security of theorganization. There must also be user awareness that must be created to ensure that the user errors andmistakes are avoided. There shall also be update and maintenance process that must be carried out for the devices of theemployees. These processes will lead to the avoidance of the risks that come up due to security flaws inthe devices. The security and IT team must carry out audits to identify the devices of the employees thatrequire an update to be installed. 3
Aztek: IT Risk Management Bring Your Own Devices (BYOD)_3
IT Risk Management at AztekIntroduction.................................................................................................................................................5Description of Aztek................................................................................................................................5BYOD: Project Overview........................................................................................................................5Financial Services Review of the BYOD Project........................................................................................6Description of Project from the Financial Perspective.............................................................................7Impact of BYOD on the Current Security Infrastructure of Aztek..............................................................8Risk Assessment Process...........................................................................................................................10Process for the Management of Risks....................................................................................................10Risk Register for Aztek.........................................................................................................................11Data Security for Aztek.............................................................................................................................14Conclusion.................................................................................................................................................15References.................................................................................................................................................174
Aztek: IT Risk Management Bring Your Own Devices (BYOD)_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Aztek: Risk Management & Assessment
|18
|4841
|31

Aztek Risk Management & Assessment
|18
|5082
|30

ITC596 - IT Risk Management - Case study of Aztek company
|18
|4571
|103

Report on IT Risk Management for Aztek
|17
|4994
|31

Aztek IT Risk Assessment Case Study September 26 2017 Aztek Financial Services
|17
|5482
|245

Aztek IT Risk Assessment (DOC)
|17
|4326
|45