logo

Manage System Security - Risk Analysis and Strategic Development

   

Added on  2022-11-09

15 Pages1941 Words334 Views
 | 
 | 
 | 
Running Head: MANAGE SYSTEM SECURITY
Manage System Security
Name of the Student
Name of the University
Author Note
Manage System Security - Risk Analysis and Strategic Development_1

MANAGE SYSTEM SECURITY1
Executive Summary:
The purpose of this report is to analyse the existing system of The Great Northern Hotel Pvt. Ltd
and analyses the existing risks measures and factors and come up with a better Information system as well
as a network that is Intrusion Free and safe and secure. The report highlights the causes of risks occurring
and measures to control and mitigate them. This report also focuses on the strategic development of all
the procedures and plans that need to be added or changed. The plans and procedures can help the Great
Northern to succeed as well as full assets security for customers as well as the organisation itself.
Manage System Security - Risk Analysis and Strategic Development_2

MANAGE SYSTEM SECURITY2
Table of Contents
Introduction:....................................................................................................................................4
Discussion:...................................................................................................................................5
Evaluation of the current system as per enterprise guidelines and procedures.............5
Risk Analysis of The Great Northern Hotel Pvt.Ltd.....................................................5
System Threats:.............................................................................................................5
Information system of the hotel and Human Interactions with it..................................6
Assessment of the current system with regards to categorization of risks....................6
Categorizing the risks based on the case study and analysis.........................................6
Assessment of risk on the operations related to humans and the interaction to the
system......................................................................................................................................6
Categorization of risks based on the assessment performed.........................................6
Matching risk plans with categories of risks.................................................................7
Effective controls that can manage and monitor risks..................................................7
Procedures to manage user access system with policies...............................................7
Effective usage of system policies and the training requirements................................7
Identifying high-risk categories.....................................................................................8
A network breakdown and record system template:.....................................................9
System security plans and procedures...........................................................................9
Designing and documenting the recovery plan for security........................................10
Identifying and documenting the controls for risks minimization of human interaction
with the system......................................................................................................................10
Security benchmarks identification from the vendors, specialists related to security
and reviews of the organisation.............................................................................................11
Manage System Security - Risk Analysis and Strategic Development_3

MANAGE SYSTEM SECURITY3
Creating plans to uncover the system re-evaluation with regards to new threats.......12
Implementing and managing the security functions with its descriptions..................12
Conclusion:....................................................................................................................................13
Manage System Security - Risk Analysis and Strategic Development_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents