logo

Risk Assessment and Disaster Recovery Scenario

   

Added on  2023-04-07

5 Pages622 Words433 Views
Running head: RISK ASSESSMENT AND DISASTER RECOVERY SCENARIO
Risk Assessment and Disaster Recovery Scenario
Name of the University:
Name of the Student:
Authors Note:
Risk Assessment and Disaster Recovery Scenario_1
1RISK ASSESSMENT AND DISASTER RECOVERY SCENARIO
Introduction
A critical element in developing a secure network is to undertake analysis of different
risk levels faced by workstations or networks along with developing a control plan through rating
importance of each risk. The objective of the paper is to analyse the risks in the organisational
context along with offering suitable risk assessment and control plan for dealing with threats to
the network security.
Nature of Network Security Threats and Controls
Unstructured threats like systems being attacked unknown to perpetrator- This
threat can be faced by network security systems through being infected that is unknown
to the perpetrator. The most common methods through which data loss disaster or data
breach takes place is by allowing access to increased number of employees, stolen
devices along with involvement of other organisations systems within the supply chain
(Sandberg, Amin and Johansson 2015)
Internal threats from existing employees those have authorised access to organisational
information increasing changes of security breach from internal attacks. Misuse of such
data can be done by these individuals those are usually an opportunistic or unhappy past
employees.
External threats from hacking and viruses where the hackers or individuals attain
unauthorised access to confidential data of the organisations (White, Fisch and Pooch
2017).
Risk Assessment and Disaster Recovery Scenario_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Risk Assessment and Disaster Recovery Scenario Name of the
|3
|157
|426

CCE 3070 Network Management: Design and Support A disaster
|6
|297
|438

Cyber Security: Policies, Training, Detection, Assessment, Recovery
|10
|1480
|414

IT Security: Potential Threats, Organizational Impact, and Security Framework
|6
|1110
|302

Disaster Recovery Plan - Ransomware
|4
|1258
|147

IT Security Risks and Solutions for Organizations
|15
|4389
|158