logo

Risk Assessment and Information Security System

   

Added on  2021-01-02

12 Pages3257 Words145 Views
Risk assessment and Information security system

TABLE OF CONTENTSINTRODUCTION...........................................................................................................................3Purpose...................................................................................................................................3Report structure......................................................................................................................3PART A...........................................................................................................................................3EXECUTIVE SUMMARY.............................................................................................................3Benefits of security management plan...................................................................................4Development of security policy and management plan........................................................4Defining the security management program.........................................................................5Roles of several groups or the individual...............................................................................5Identifying the models and the methods.................................................................................6Legal and statutory laws.........................................................................................................6PART B............................................................................................................................................6Risk Assessment and Management..................................................................................................61 Presenting the process of risk assessment...........................................................................62 Benefits of risk management plan and their performance...................................................73 Identification of the asset of the PAI.................................................................................74 Identifications the threat and vulnerabilities of PAI...........................................................85 Setting out the prioritise......................................................................................................96 Suggestion over control measures.......................................................................................9CONCLUSION..............................................................................................................................10REFERENCES..............................................................................................................................11

INTRODUCTIONPower AI is the organization which develops software for business, home and industrialuse. It lays special emphasis on development of artificial intelligence systems for controllingpower use, storage and generation in different environments. This has also developed numerousunique solutions for these stated applications.PurposeThe objective of this report is to prepare risk management plan for protection ofintellectual property of Power AI. It is facing major security concern so in this aspect, it willinclude different examples of assets through different categories people, process, software andhardware.Report structureThe present report is categorised in two parts as in A part, merits of security managementplan, development, roles, governance are stated. This will determine methods and models whichare relevant for security management program along with their legal requirements. The part Bwill state about risk management process.PART AEXECUTIVE SUMMARYRisk assessment is used for providing description about overall procedure of methodwhich determines hazards along with risk factors with high potential for causing harm. Thisreport will give brief description about risk and security management and governance program. Ithas shown that, security management is beneficial to business especially in Power AI.Simultaneously, it has shown development of security policy and security management programis determination of assets of organization followed through development, implementation anddocumentation of policies and process to protect these assets. The models and methods fordeveloping SM program for PAI are Securing the software development and encryption and thekey management. It has reflected functions, task, roles and responsibilities for securitymanagement program (Al-hashimi and et.al., 2018). Further, it has evaluated about implicationsof legal and statutory requirements such as appropriate registrations of copyright, patents insystematic and timely manner. However, in risk management it has identified risk and process

for solution an recommendation to cost benefit analysis. Thus, application in PAI would enablingfor controlling the corporate IT systems, network, use of information by specifying user’sfunction and accessibility. Benefits of security management planIt leads to operative effectively along with availability of information as per requirement.This serves the interest of the business and strikes balance among security measures and value ofthe information. It provides competitors significant cost advantage for development of similarproducts and makes availability to society or market for attaining defined objectives. Theinappropriate information supply is main reason for substandard product and services. Apartfrom this, it will offer added value for an particular information system and contributes forcontinuity of Power AI and helps for attaining objectives. It leads to appropriately aligningobjectives and to manage security issues. Generally, it aims for meeting security requirements along with other externalrequirements further to legislation, contracts and externally imposed policies. This will givebasic level of security, independent of external requirements as it is essential for maintaining theuninterrupted operation of the the Power AI. Development of security policy and management planSecurity policies are very important for business perspective as it helps in securingorganization with different attack. In this aspect, there must be application of major points whichare identifying risk, observe and learn from others, ensuring that policy is confirmed to legalrequirements, security and risk level must be equal, inclusion of staff for policy development,training employees, written consent, setting clear penalties and enforcing, upgrading staff andinstalling tools as per need (Ayoubi and et.al., 2018). In Power AI, there will be implication ofcopyright the information with context to security. Further, security management plan is veryimportant as it determines assets of organization with people, hardware, software and process.This is followed through development, implementation, documentation of procedures andpolicies for purpose of protecting the assets.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Management and Governance
|16
|2950
|185

Developing a Security Management Program and Risk Assessment Plan for Power AI
|15
|3186
|124

Information Security Management and Governance
|10
|1280
|151

Security Management and Governance
|17
|3817
|35

Security Management and Governance
|10
|2029
|100

Security Management and Governance
|14
|3130
|34