logo

IT Risk Management

   

Added on  2023-04-21

7 Pages1140 Words279 Views
Running head: IT RISK MANAGEMENT
IT RISK MANAGEMENT
Name of the student:
Name of the university:
Author note:
IT Risk Management_1
1IT RISK MANAGEMENT
Table of Contents
Introduction:...............................................................................................................................2
Security policy for the granting privileged accounts to users (Part 2):..................................2
Intent and rationale of the policy:..........................................................................................2
The policy:.............................................................................................................................3
Scope:.....................................................................................................................................4
Conclusion:................................................................................................................................4
References:.................................................................................................................................5
IT Risk Management_2
2IT RISK MANAGEMENT
Introduction:
IT risk management is one of the most important tasks for the organizations in today’s
world. There are different kinds of risks that the organizations may face in terms of data
privacy, acts of employee vandalism, brand defamation, virus infections as well as intrusions
by hackers. These issues can have enormous economic impacts on the overall business of the
organizations. The following report will conduct a complete risk analysis faced by the
Information technology used in the different organizations and suggest recommendations to
prevent them. A security policy will also be provided in the second part of the report. By the
end of the report, the reader will have a clear idea on the complete IT risk management within
tan organization and how they can be implemented.
Security policy for the granting privileged accounts to users (Part 2):
The security policy to be followed at the Commonwealth Scientific and Industrial
Research Organisation (CSIRO) while granting privileged accounts to the different users is
explained below:
Intent and rationale of the policy:
Protecting and managing access to the IT systems as well as applications since it is
crucial to ensure the integrity of the Commonwealth Scientific and Industrial Research
Organisation data and unauthorised access to the resources shall be prevented.
Access to the CSIRO systems should be restricted only to the authorized users based
on the security principles of the organization, just to get their job completed. Users” can be
the students, agents, CSIRO employees, consultants as well as contractors, accessing the
CSIRO computers and other applications. “Access Privileges” are the permission of the
CSIRO systems, which are linked, to an account. It includes the permissions to access as well
IT Risk Management_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Developing a Security Policy
|10
|1915
|475

IT Infrastructure of MyHealth Company
|15
|3549
|225

Formatting Scheme for Drives: NTFS as the Preferred Choice
|14
|1951
|2

Developing System Access Security Policies for Healthcare Organizations
|13
|3040
|271

Security Access Policy Plan and Risk Assessment for Healthcare Organization and Facebook
|12
|2961
|377

Authorization and Authentication in Hive - DOC - Desklib
|5
|987
|57