logo

ITC596 - Risk Management Assignment

4 Pages619 Words73 Views
   

Charles Sturt University

   

IT Risk Management (ITC596)

   

Added on  2020-03-04

About This Document

The below document discusses IT Risk Management. The various questions which have been discussed in this assignment are " Identification and discussion on the security concept " and " Classification of the information asset".

IT Risk Management Part A
IT Risk Management Part B

ITC596 - Risk Management Assignment

   

Charles Sturt University

   

IT Risk Management (ITC596)

   Added on 2020-03-04

ShareRelated Documents
Running head: IT RISK MANAGEMENTIT risk managementName of the student:Name of the university:Author Note
ITC596 - Risk Management Assignment_1
1IT RISK MANAGEMENTTask 2: 1. Exercise 1:1.1. Identification and discussion on the security concepts: The first security concept has been generating from the owners. They have been theindividuals or the organizations that have possessed the assets. The owners have been valuing theirresources. They have been aware regarding the vulnerabilities on their resources many times. Thenext one is the countermeasures. There have been the controls of protection that has been imposedby the owners of the assets for mitigating the vulnerabilities, threats and risks in the assets. The nextone is the vulnerabilities. They have been the flaws in the resources or the non-presence of thecontrols of the security. This has been raising the likelihood of the risks to the resources (Dojutrek etal. 2016). The next one is the threat agents. They have been the entities that possessed the ability todo introduction of the threats to the assets. The next one is the threat. They have been the entitiesthat have been exploiting the vulnerabilities in the assets. Then there has been the risk that has beenthe probability that the assets might get compressed by the threats. The last one is the assets thathave been including the programs, applications, data and information, system infrastructure asowned by the owners (Onwubiko and Lenaghan 2007). 2. Exercise 2: 2.1. Classification of the information asset:The asset classification has been done by the organizations for recognizing which of the asstshave been crucial for their operations. The most crucial information asset has been the informationthat is confidential and sensitive (Theage.com.au, 2017). The failure of the assets has been leading to
ITC596 - Risk Management Assignment_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Management
|11
|3202
|65

Homeland Security Border Security Issues
|4
|514
|207

Amazon Web Services Security Evaluation
|10
|2101
|84