Ask a question from expert

Ask now

ITC596 - IT Risk Management | Report

11 Pages2081 Words107 Views
   

Charles Sturt University

   

IT Risk Management (ITC596)

   

Added on  2020-02-24

About This Document

ITC596 - IT Risk Management | Report, Information technology, and its affiliated components are today identified as important capital tools that offer valid information for business success. This outcome has influenced the application of IT components in different aspects of life, which has also contributed to the prevalence of security issues. This report, therefore, offers an assessment of the various security issues experienced in IT and their relation to the existing technological landscape. Furthermore, the existing models and control mechanisms of these security issues are highlighted, together with the commonly experienced threats and risks.

ITC596 - IT Risk Management | Report

   

Charles Sturt University

   

IT Risk Management (ITC596)

   Added on 2020-02-24

BookmarkShareRelated Documents
Running head: IT RISK MANAGEMENTAssessment 1 [Student Name Here][Institution’s Name Here] [Professor’s Name Here][Date Here]
ITC596 - IT Risk Management | Report_1
IT RISK MANAGEMENT2Table of ContentsContents PageIntroduction........................................................................................3IT security and Technology landscape.....................................................3Vulnerabilities and threats.....................................................................4Mitigation and the benefits....................................................................5IT Security Models & Access Controls....................................................5Threats, vulnerabilities and access control............................................5Mitigation: Access control models (3 common types)..........................6Benefits.................................................................................................6IT Security Threat and risk assessment....................................................7IT risk assessment of threats.................................................................7Mitigation procedures and benefits.......................................................8Conclusion...........................................................................................8References............................................................................................9
ITC596 - IT Risk Management | Report_2
IT RISK MANAGEMENT3IntroductionInformation technology and its affiliated components are today identified as important capitaltools that offer valid information for business success. This outcome has influenced theapplication of IT components in different aspects of life, which has also contributed to theprevalence of security issues[ CITATION Tey11 \l 2057 ]. This report, therefore, offers anassessment of the various security issues experienced in IT and their relation to the existingtechnological landscape. Furthermore, the existing models and control mechanisms of thesesecurity issues are highlighted, together with the commonly experienced threats and risks. Inall, the report gives a thorough evaluation of the security elements in IT including systemvulnerabilities and mitigation procedures.IT security and Technology landscapeTechnology has always held a common objective despite the advances and inventions thathave been seen throughout the years. In essence, the term will outline any element that makeslife easier, and none of these elements is more profound and effective as IT. Now, in the past,the technological landscape focused on mainframe systems that delivered services to usersthrough complicated connections[ CITATION Kuc15 \l 2057 ]. However, the modern landscapeas shown in the diagram below is predominantly user centred including the applicationsthemselves that use cognitive designs to enhance usability. Nevertheless, the same structurethat enhances the usability of technological components creates many vulnerabilities thataffect the security of modern technological systems[ CITATION DST16 \l 2057 ].
ITC596 - IT Risk Management | Report_3
IT RISK MANAGEMENT4Fig: Technological landscape Vulnerabilities and threatsRapid technology evolution: consider new technologies that are always been introduced intothe market yet lack established standards to protect the users. For instance, social media wasfaced with several attacks at its onset propagated by the weak security measures used e.g.water holing attacks. The similar outcome is experienced with malware attacks that are nowintensified by rapid advances in mobile technology which facilitate their propagation. Userstoday have extended access to connections (internet) which facilitates self-replicatingmalware e.g. WannaCry ransomware that used unprotected access ports[ CITATION She171 \l2057 ]. User negligence: most modern day users take security feature for granted includingsurrendering their information to multiple social network sites. These attributes trickle downto complex applications where organization fail to employ proper security measure exposingtheir data and users[ CITATION GU17 \l 2057 ].Smart system: Technologies such as Internet of things have led to the development of smartdevices that automatically connect and share information. They are also facilitated bywireless technology which unlike wired networks lacks physical security, a serious loopholeUsersAPIsAPIsDataVirtual Resource e.g. CloudHardware resources
ITC596 - IT Risk Management | Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT-373 - Report on IT Security
|11
|2410
|51

Concepts of IT Security and the Technological Landscape Model Report
|7
|1248
|54

Network Security Management
|12
|3039
|83

CYBER SECURITY Name: Student Id: Name of univeristy:.
|8
|4621
|39

Security and Risk Assessment for Mobile Devices
|11
|2676
|85

Security Threats in Cloud Computing
|4
|668
|210