logo

Risk Management Assignment Help

   

Added on  2020-02-24

8 Pages1485 Words39 Views
Running head: IT RISK MANAGEMENTIT RISK MANAGEMENTName of the StudentName of the UniversityAuthor Note

2IT RISK MANAGEMENTTable of ContentsIntroduction......................................................................................................................................3IT Security & Technology Landscape.............................................................................................3IT Security Models & Access Controls...........................................................................................3IT Security Threat and risk assessment...........................................................................................4Conclusion.......................................................................................................................................4References........................................................................................................................................6

3IT RISK MANAGEMENTIntroductionData security is very much vital in every aspect of living. As a result of the massivebreaches in the data by major corporations with respect to every industry data security is a talk ofthe tech world. The impact of the data securities can be of very much importance due to thefactor of economic and reputation impact it causes (Carver, Minku & Penzenstadler, 2017). Thisfactor is the main reason of a massive shift going on in the world today. The different securitypoint features that are available such as firewalls can be of very much benefit as they not onlyprovide security but also take action to address the threats.There can different situation where a person wants to access a data on a network drive butdoes not have access to it. This happens at most appropriate time and as a result of which theyneed to get holds of the system administrator in order to grand them the permission. Access pointis basically a technique of identifying a person doing a specific task or job which can beauthenticated by looking at their identification with respect to which the access can be given.Information security model can be related to methods that are used in order to authenticatesecurity policies as they are intended to provide a precise set of rules that a computer mustfollow (Angst el al., 2017)Security threads and risk assessment should be incorporated when there is a developingor implementing major changes to or acquires an information system. These are the basiccomponents of the overall risk management aspect (Karim et al., 2017)

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT-373 - Report on IT Security
|11
|2410
|51

IT Security & Technology Landscape - Report
|5
|1124
|153

ITC596- IT Risk Management Assessment
|7
|1356
|90

IT Security & Technology Landscape : Assignment
|10
|1862
|58

Enisa Big Data Security Infrastructure
|12
|3364
|245

ITC596 | IT Risk Management
|8
|1612
|104