logo

Report on Risk Management and Mitigation Plan

   

Added on  2022-12-27

6 Pages1401 Words65 Views
Running head: REPORT ON RISK MANAGEMENT AND MITIGATION PLAN
REPORT
ON
RISK MANAGEMENT AND MITIGATION PLAN
Name of the Student
Name of the University
Author Note:
Report on Risk Management and Mitigation Plan_1
Risk Management1
Introduction:
The aim of this report is to identify the possible vulnerabilities present in the IT
organization’s activities. Followed by identifying the vulnerabilities this paper also includes a
detail elaboration related to the risk present in each of the identified vulnerabilities. Along
with elaborating the risk it will also include the impact and the mitigation approaches as well
in order to establish a safe IT infrastructure within the organization.
Identified Vulnerabilities:
Followed by the above mentioned objectives it has been observed that while considering
the IT infrastructure there are several security vulnerabilities present which holds significant
impact on the organizational services are listed below-
Important data loss-
Among all of the possible vulnerabilities present in the IT infrastructure data loss is
one of the most significant vulnerabilities as it has been observed from the investigation
that due to several security as well as management issues the organizations faced problems
related to the data loss.
Unauthorized Access-
Followed by the above specified vulnerabilities it has been noticed that there is a
significant impact of unauthorized access within the organization as due to this the assets
as well as the resources of the organization become accessible for outsiders which may
cause significant impact on the organizational services.
Inadequate Data Backup-
Considering above mentioned aspects it has been noticed that due to inadequate data
backup the important data of the organization gets attacked by the hackers which creates
significant problem related to their services.
Report on Risk Management and Mitigation Plan_2
Risk Management2
Criminal Activities within the organization-
Due to the possibilities of criminal activities within the organization it has been
noticed that the organizational services gets affected as the criminal activities such as the
DoS attacks, Ransomware attacks as well as the data phishing holds a significant impact
on the services of the organization (Papp & Buttyan 2015).
Human Fault-
Along with all of the above mentioned vulnerabilities it has been noticed that there is
a significant impact of human errors in the organization security which also significantly
impacts the services as well as the reputation of the organization.
Risk Present in the identified vulnerabilities:
Data Loss- is one of the significant security vulnerabilities present in the IT
infrastructure consists high risk. Due to the data loss within the organization, the
company will get significantly harmed as the loss of important data holds the
capabilities to reduce the effectiveness of the organizational services. Along with that
it also harms the reputation of the organization (Joshi & Singh 2017).
Unauthorised Access- is also one of the most significant risk factors which is caused
by the less capable authentication process as this invokes the criminal activities within
the organization. As due to the incorporation of the less effective user authentication
techniques the vulnerabilities caused by the unauthorized access increases.
Inadequate data loss- followed by the above aspects it has been noticed that in case
of any attack occurs which causes data loss will significantly affect the organizational
services if no data backup is kept within the IT infrastructure.
Criminal activities- within the organization significantly affects organizational assets
by several harmful attacks which includes the data phishing, DoS as well as the
Report on Risk Management and Mitigation Plan_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Effectiveness of The Approached Strategies
|13
|2989
|19

Advance Security Techniques : Echrs Ltd
|15
|3951
|16

Security Issue in Cloud Computing
|14
|624
|70

Security Risk Analysis
|7
|1068
|24

Information Technology 2022 Report
|12
|4826
|26

Corporate Security Management Report 2022
|10
|2173
|15