logo

Report- IT Security & Risk Assessment - ITC596

   

Added on  2020-03-04

10 Pages1547 Words47 Views
Running head: IT RISK MANAGEMENTIT Risk ManagementName of the StudentName of the UniversityAuthor’s Note

1IT RISK MANAGEMENTExecutive SummaryThis report deals with the UT security and risk assessment of the data and information in thecompanies. There are many cases in which the data and information has been recovered by thecompanies in the market. The use of the updated firewalls and anti-viruses software helps inreducing the risks of cyber attacking the server of the company. The proper risk management hashelped in tracking these activities over the Internet and making the company free form the cyber-attacks. The hackers are restricted ti enter into the security firewall of the server.

2IT RISK MANAGEMENTTable of ContentsIntroduction......................................................................................................................................3IT security and technology landscape..............................................................................................3IT security models and access controls...........................................................................................4IT security threat and risk assessment.............................................................................................6Conclusion.......................................................................................................................................8References........................................................................................................................................9

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report on Security and Risk Management of Data
|9
|1317
|106

BUSI 414 - UT Security and Risk Assessment
|9
|1437
|83

Creating a Company Culture for Security - Security steps and methods for an organization
|4
|534
|193

ITC596 - It Risk Management
|10
|1552
|83

Cyber Security - Identification of threats
|16
|1865
|20

Information and Data Security Issues Report
|6
|734
|155