logo

Risk Analysis for XYZU: Vulnerabilities, Risks, and Mitigation Strategies

   

Added on  2023-04-22

12 Pages2557 Words127 Views
 | 
 | 
 | 
Running head: RISK ANALYSIS
RISK ANALYSIS
Name of Student
Name of University
Author’s Note
Risk Analysis for XYZU: Vulnerabilities, Risks, and Mitigation Strategies_1

1RISK ANALYSIS
Executive summary
Vulnerabilities like threats and risks are very common problems for various enterprises.
Vulnerabilities might take place because of various loopholes in the organization. Some
loopholes might be present in the working principles, technical systems, strategies or many more
factors of the organization. The case study on XYZU has various factors because of which they
are vulnerable to numerous security threats. This assignment discusses regarding various issues
faced by the organization including numerous recommendations that can be utilized by the
organization in order to prevent the issues. Some recommendations are creating passwords that
are strong in nature, implementing various programs for security, implementing a firewall and
some more. This particular assignment describes regarding various gaps that require attention in
order to secure data that belongs to the organization. Analysis that are qualitative as well as
quantitative in nature are also described as one of the ways that can be used to secure data.
Risk Analysis for XYZU: Vulnerabilities, Risks, and Mitigation Strategies_2

2RISK ANALYSIS
Table of Contents
Introduction..........................................................................................................................3
Discussion............................................................................................................................3
Risks................................................................................................................................3
Recommendations for the project and their impacts on the organization.......................5
Qualitative and quantitative approaches and their advantages........................................6
Protection mechanisms that can be implemented............................................................6
Gaps that require further analysis....................................................................................7
Conclusion...........................................................................................................................8
References..........................................................................................................................10
Risk Analysis for XYZU: Vulnerabilities, Risks, and Mitigation Strategies_3

3RISK ANALYSIS
Introduction
Usually organizations are open to threats and vulnerabilities due to various reasons. The
issues that might cause threats include errors in working principles IT framework or any among
the factors of the organization. In this assignment a scenario had been provided of XYZU, this
university consists of some loopholes and can be misused by hackers in order to steal data that
belongs to the organization (Aven, 2016). This report discusses regarding the issues, it further
discusses regarding the mitigation strategies along with their impacts on the university. This
report depicts the analysis of technical risk that had been done by keeping in mind the
technology environment present in organization.
Discussion
Risks
Considering the provided scenario provided in the report it can be found that the
organization is vulnerable to a huge number of risks, the risks are mentioned below
Data breach: data breach can be described as a process of data loss where the
data owned by an organization is accessed by an unauthorized user or hacker.
This data is stolen for ill purposes. The organization in the scenario is vulnerable
to this sort of data breach because the documentations are saved in various servers
that are usually visible by people having access to internet (Shapiro, 2016). If
people who does not belong to the organization might use it for handing over to
opponent organization or hackers. Moreover the servers do not run on recent
operating systems which might also be the reason for security threat.
Risk Analysis for XYZU: Vulnerabilities, Risks, and Mitigation Strategies_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents