logo

Victorian Protective Data Security DELL Executive Summary

15 Pages3646 Words65 Views
   

Charles Sturt University

   

IT Risk Management (ITC596)

   

Added on  2020-03-02

About This Document

ITC596 - The relevant data have been provided in the field of information technology risk and its management process as per the case study. The security environment is associated with the exponential growth of personal mobile, tablets, and computers. It also needed to protect personal and confidential data.

Victorian Protective Data Security DELL Executive Summary

   

Charles Sturt University

   

IT Risk Management (ITC596)

   Added on 2020-03-02

ShareRelated Documents
Victorian Protective Data Security DELL Executive Summary_1
Executive SummaryThe relevant data have been provided in the field of information technology risk and itsmanagement process as per the case study. The security environment is associated with theexponential growth of personal mobile, tablets and computers. It also needed to protect thepersonal and confidential data. The threats are also another kind of reasons behind thissecurity and risk management. IT threat and securities are discussed considering the casestudy of Victorian protective data security.
Victorian Protective Data Security DELL Executive Summary_2
Contents1. Pictorial representation of current security risks which are considered by the VICgovernment.................................................................................................................................32. Diagram explanation and recognising the areas of high, medium, medium-low, and lowrisk exposure..............................................................................................................................44. VIC government facing challenges while carrying out security or risk management withininternally or externally via outsourcing.....................................................................................85. Comparison between the concepts of ‘’Risk’’ and ‘’Uncertainty’’ with the help of casestudy of Victorian Data security..............................................................................................106. Discussion and evaluation of different approaches which are available to the VICgovernment for risk control and mitigation.............................................................................12Conclusion................................................................................................................................14Reference..................................................................................................................................14
Victorian Protective Data Security DELL Executive Summary_3
1. Pictorial representation of current security risks which are considered by the VIC government.The security risk and threats considered by the VIC government is pictorially shown in the figure withthe help ofFigure: Secure coding controls2. Diagram explanation and recognising the areas of high, medium, medium-low, and low risk exposure.The risks are classified into various ways depending upon the situation. Generally, the risk isclassified are low and medium risk. The Medium risk is further classified as low medium riskand high medium risk.
Victorian Protective Data Security DELL Executive Summary_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Victorian Protective Data Security Case Study
|16
|3331
|113

Security Risks and Concerns 8/28/2017 Introduction 3 Security Risks and Concerns Diagram
|11
|3156
|439

(solved) IT Risk Management PDF
|15
|3652
|47

ITC596 - VIC Government - Security Risks and Concerns
|12
|3080
|34

EDUC 448 - Victorian Protective Data Security Framework
|11
|2816
|230

IT Risk Management Security System
|17
|3744
|61