logo

IT Risk Management Report | Study

   

Added on  2022-09-01

9 Pages3000 Words25 Views
IT RISK MANAGEMENT
Report
RUNNING HEAD: IT RISK MANAGEMENT Page | 0
DECEMBER 28, 2019

Table of Contents
1. Introduction..................................................................................................................................................................... 0
2. Risk analysis...................................................................................................................................................................0
Security policies...................................................................................................................................................................0
Administrative control.........................................................................................................................................................1
Server configuration............................................................................................................................................................1
Mobile access risk................................................................................................................................................................1
3. The key controls to mitigate the risk...............................................................................................................................2
Backup and disaster recovery...............................................................................................................................................2
4. A risk register for Regional Gardens...............................................................................................................................2
5. Conclusion...................................................................................................................................................................... 3
6. References.......................................................................................................................................................................4
IT RISK MANAGEMENT Page | 1

1. Introduction
The risk register is the best solution for IT risk
management, as it has provided details about the risks
with its controls. Risk is an uncertain thing, which can be
the reason behind huge losses to a firm in their future.
Thus, it is necessary to reduce the vulnerabilities of a
system to overcome the risks of that system [1]. In the
case of Information Technology (IT) systems, risks are
high because of many reasons, such as lack of security,
knowledge, and many more.
This report will analyze various risk factors of Regional
Gardens Ltd. Moreover, it will discuss about
international frameworks for risk management for IT
assets. Moreover, this report will explain about the
impact of risks on the company.
2. Risk analysis
Risk register has used to manage various types of risks
and threats using various controls and mitigation
strategies. It has used for managing risks in an
organization. As a Chief Information Officer (CIO), I
will suggest to the company about an audit for all the IT
assets of the company as well as monitor all the controls
for risks of the company. The company is selling plants
and garden suppliers to its customers and the public. The
risk management life cycle has used for managing risks
[2].
Source: [3]
The firm has taken help from their regional garden
planners that provide various services, such as design,
consultancy services, and garden advice. The firm has
used the data center to manage all the data and
information as well as servers and other things. The firm
has employed 65 staff for various purposes, such as
administrative staff, nursery, planner staff, and more. The
firm has used different IT assets to manage all the things,
such as personal computers with Windows 7 enterprise,
and 3 MacBook Laptops with OS X. there are various
methods to analyze risks of a firm, such as ISO 31000.
Source: [4]
The firm should adopt proper strategies to mitigate all the
risks form IT systems. It is beneficial for the company as
well as customers. In addition, people can use the basic
services of the firm using proper systems. ISO 31000
framework has used proper communication and
consultation [4]. It has provided proper analysis and
evaluation with treatment. Moreover, monitor and review
are necessary for various reasons. Most of the processes
can be managed using identification and many others
[5].
Security policies
In addition, the firm has not implemented proper policies
for patching and update. The company has managed all
the things using all the staff members, which has decided
by the top management. The firm has managed systems
IT RISK MANAGEMENT Page | 2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
There are many ways to analyse different resources
|10
|1675
|9

Performance Verification Challenge
|13
|1930
|17

IT Risk Management (ITRM) Reviews
|12
|1493
|16

Security policy development and risk management Report 2022
|13
|2914
|21

Entity Management Service for Internet of Things-Based
|8
|2105
|22

IT Security Risk Assessment
|13
|2259
|16