logo

IT Security in an Organization - Risk Assessment and Disaster Management

   

Added on  2022-11-13

14 Pages3006 Words309 Views
Running head: IT SECURITY IN AN ORGANIZATION0
IT SECURITY OF AN ORGANIZATION
Name of the Student
Name of the Organization
Author notes

IT SECURITY IN AN ORGANIZATION
1
Executive Summary
This report discusses regarding risk assessment related the Information Technology in an
organization. This report also discusses regarding the risk assessment related to the disaster
management and also the management plan. It also tells the set of the enhanced IT policies for
including the data protection, whistle blowing policy, Acceptance Use Policy, backup policy,
Staff training policy, and also the password policy.

IT SECURITY IN AN ORGANIZATION
2
Table of Contents
Introduction:....................................................................................................................................3
Discussion........................................................................................................................................3
Conclusion.......................................................................................................................................9
References:....................................................................................................................................10

IT SECURITY IN AN ORGANIZATION
3
Introduction:
The risk assessment of the information technology is a kind of document that is used to
review that has the possible threats that the company faces, human made and/or natural (Cardona
2013). These threats are weighted by the occurrence of the likelihood and after that it is affect the
operation section of the organization in the exponential manner. Disaster Management is a very
important part of the management of the emergency situation that enhanced the programme
which are developed and is implemented by using the analysis and the information of the IT
(Chang and Ramachandran m 2015). The majority of the Geographical Information System is
allowing the emergency situation for identifying the cause of the disaster. For this case, the size
and the scope of the emergency situation of that organization is very logically. The appropriate
steps regarding this matter should be taken very carefully. This report discusses regarding the
risk assessment regarding the IT services and also the related data (Cole et al. 2013). It also
discusses regarding the policy of the disaster management and also the recovery plan. This report
also discusses regarding the data protection, the whistle blowing policy, backup policy and also
the staff training policy and many others.
Discussion
In today’s world the risk management in the IT industry is gaining its popularity. The
tremendous compliance effort for dealing with many regulations in separate manner and audit
each regulation individually (Glendon and Clarke 2015). It may often distract the ability of the
company for identifying the risk exposure in the true manner. Different company offers the IT
risk management in automated form. It will provide the guidance and support for selecting,

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Strategies and Working Practices in Health Care
|3
|4494
|108

IT Management
|7
|797
|401

IT Risk Assessment, Threat Assessment, Risk Management
|6
|1419
|237

Information Security Policy
|6
|1829
|79

1. TITLE OF PAPER. Title of Paper My Name Course Title
|10
|1681
|3

Cyber Security: Policies, Training, Detection, Assessment, Recovery
|10
|1480
|414