logo

Risk Assessment - Digital Security Risks

   

Added on  2023-04-21

10 Pages1881 Words441 Views
Running head: RISK ASSESSMENT - DIGITAL SECURITY RISKS
Risk Assessment - Digital Security Risks
Name of the Student
Name of the University
Author Note
Risk Assessment - Digital Security Risks_1
1RISK ASSESSMENT - DIGITAL SECURITY RISKS
Executive Summary
Identification of potential risks within any system is an obligation is the Chief Information
Security Officer or the CISO of an Australian University. There are many ways in which the
information and data generated within a university through the day to day activities is that a
potential risk of getting compromised due to various factors. These factors need to be identified,
so that further they can be prioritised according to the severity and taken appropriate measures to
mitigate them. if these identified risk are not mitigated they have the potential of destroying the
information system and information technology architecture of the IT system completely.
Risk Assessment - Digital Security Risks_2
2RISK ASSESSMENT - DIGITAL SECURITY RISKS
Table of Contents
Introduction......................................................................................................................................3
Description of the Risk................................................................................................................3
Summary of the Impact or Consequences if the Risk was to arise..............................................3
Inherent Risk Assessment............................................................................................................3
Key controls to mitigate the risks................................................................................................3
Residual Risk Assessment...........................................................................................................3
Risk Prioritization with Risk Matrix............................................................................................3
Conclusion.......................................................................................................................................3
References........................................................................................................................................4
Risk Assessment - Digital Security Risks_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Role and Importance of Risk Register for University's Digital Security
|13
|3003
|227

Risk Management
|10
|1940
|69

ISM | Cyber Security Importance for University
|17
|2844
|25

IT Risk Management: Conducting a Risk Assessment and Developing a Security Policy
|12
|3074
|482

Digital Security Risk
|9
|1801
|382

Risk Management Assessment 2022
|7
|1151
|21