logo

IT Security Management: Threats, Vulnerabilities, and Risks

Answering reflection questions on risk management and risk analysis, strategic roles of information security, information technology, and management and users, criteria for allocating weighting to assets, factors determining cost of recovering from an attack, process of identifying potential threats, types of threats to a small internet commerce company, methods to control risk, pros and cons of ISO 31000:2009 - Risk Management Principles and Guidelines, and risk assessment for a group project.

12 Pages1328 Words286 Views
   

Added on  2023-06-14

About This Document

This article discusses the identification and ranking of assets, threats, threat vulnerability assessment worksheet, risk worksheet, and risks control and residual worksheet. It also includes a bibliography of relevant sources.

IT Security Management: Threats, Vulnerabilities, and Risks

Answering reflection questions on risk management and risk analysis, strategic roles of information security, information technology, and management and users, criteria for allocating weighting to assets, factors determining cost of recovering from an attack, process of identifying potential threats, types of threats to a small internet commerce company, methods to control risk, pros and cons of ISO 31000:2009 - Risk Management Principles and Guidelines, and risk assessment for a group project.

   Added on 2023-06-14

ShareRelated Documents
Running head: IT SECURITY MANAGEMENT
IT security management
Name of the Student
Student Number
Name of the University
Due Date
Author’s Note:
IT Security Management: Threats, Vulnerabilities, and Risks_1
1
IT SECURITY MANAGEMENT
Table of Contents
Identification and Ranking of Assets.........................................................................................2
Threats........................................................................................................................................3
Threat Vulnerability Assessment Worksheet.............................................................................3
Risk Worksheet..........................................................................................................................6
Risks Control and Residual Worksheet......................................................................................8
Bibliography.............................................................................................................................10
IT Security Management: Threats, Vulnerabilities, and Risks_2
2
IT SECURITY MANAGEMENT
Identification and Ranking of Assets
There were various important information assets that were involved for completing as
well as exceeding expectations in my academic performance. The several information assets
that were involved for completing this assignment are given below:
i) People
ii) Data and Information
iii) Software
iv) Hardware
According to the priority of the assets, they are listed below:
Information Assets Criterion 1:
Contribution to me
Criterion 2:
Contribution to my
academic
performance
Weighted Score
Criterion Weight (1-100) 40 60
Software 1.0 1.0 100
Hardware 0.9 0.9 90
Data and Information 0.7 0.8 75
People 0.5 0.3 40
IT Security Management: Threats, Vulnerabilities, and Risks_3
3
IT SECURITY MANAGEMENT
The software and hardware are the most important information assets that were
required towards the completion of this assignment. Next, comes the data and information. It
is ranked in three in my assets ranking. The weighted score of this particular asset is 75. This
information and data were extremely important to understand the value of the assignment and
also towards my academic performance. The final information asset is the people. It has the
weighted score of 40.
Threats
Threats are the most vulnerable risks that can occur to any person or any asset. For
this assignment, there are few threats that can occur to my group for not completing the
assignment. These threats with proper examples are given below:
Threats Examples
Compromise to intellect Piracy, copying
Deviation in quality in our group performance Failure
There are few threats for me as well if I will not be able to participate fully in the
assignment. They are as follows:
Threats Examples
Compromise to my intellect and knowledge Less marks, Lack of knowledge
Deviation in my career Failure
Threat Vulnerability Assessment Worksheet
There are few possible vulnerabilities to all the threats identified for me and my group
members. They are listed below:
IT Security Management: Threats, Vulnerabilities, and Risks_4

End of preview

Want to access all the pages? Upload your documents or become a member.