logo

BUSI 414 - UT Security and Risk Assessment

   

Added on  2020-03-01

9 Pages1437 Words83 Views
Running head: IT RISK MANGEMENTIT Risk ManagementName of the StudentName of the UniversityAuthor’s Note

1IT RISK MANAGEMENT Executive SummaryThis report deals with the UT security and risk assessment of the data and information in thecompanies. There are many cases in which the data and information has been recovered by thecompanies in the market. The use of the updated firewalls and anti-viruses software helps inreducing the risks of cyber attacking the server of the company. The proper risk management hashelped in tracking these activities over the Internet and making the company free form the cyber-attacks. The hackers are restricted ti enter into the security firewall of the server.

2IT RISK MANAGEMENT Table of ContentsIntroduction......................................................................................................................................4IT security and Technology landscape............................................................................................4IT Security Models and Access controls.........................................................................................5IT security Threat and risk assessment............................................................................................7Conclusion.......................................................................................................................................8References........................................................................................................................................9

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report- IT Security & Risk Assessment - ITC596
|10
|1547
|47

Report on Security and Risk Management of Data
|9
|1317
|106

Cyber-Attacks in the World
|11
|2065
|317

Information and Data Security Issues Report
|6
|734
|155

Creating a Company Culture for Security - Security steps and methods for an organization
|4
|534
|193

Cyber Security Awareness Training for Widget Inc Dot Com
|11
|855
|364