logo

Security Analysis: Risk Assessment and Mitigation Strategies

   

Added on  2023-04-19

15 Pages2012 Words445 Views
 | 
 | 
 | 
Running head: SECURITY ANALYSIS
SECURITY ANALYSIS
Name of the Student
Name of the University
Author note
Security Analysis: Risk Assessment and Mitigation Strategies_1

2
SECURITY ANALYSIS
Table of Contents
Introduction................................................................................................................................4
Conclusion................................................................................................................................14
Recommendation......................................................................................................................14
References................................................................................................................................15
Security Analysis: Risk Assessment and Mitigation Strategies_2

3
SECURITY ANALYSIS
Executive Summary
This report recognizes the issues that are present in the commencement of the projects that
are undertaken by the software-based organization. Risk analysis is performed along with the
presence of risk register. The risk register will also help in identifying the risks that will
affect the organization in a negative manner. Risk mitigation strategies is also stated and this
will help in better completion of the project.
Security Analysis: Risk Assessment and Mitigation Strategies_3

4
SECURITY ANALYSIS
Introduction
This report will provide a brief discussion regarding the risk assessment. Protection
measures will also be stated in this report. Recommendations regarding improvement of the
development system will also be provided.
Risk Assessment
I
D
Description Impa
ct
Likelihoo
d
Seriousne
ss
Grad
e
Mitigation Responsibili
ty
1 Risk present
in the
management
of the
software
organization
includes risks
in storing of
data in
servers. In
case of using
servers, the
entire data is
divided into
packets and
this data
packets are
stored in the
data base and
this leads to
the fact that
the data sets
are well
maintained
and gets
stored in the
computing
system of the
cloud storage
companies.
Despite being
the fact that
the cloud
storage
companies
have
individual
protocols,
imposters can
crack the
security
High Low High 6 Protection
measures
that must
include
encryption
of data.
This will
incur the
fact that
despite the
data that
are present
are stored
as per the
protocol of
the cloud
platform
the
illegibility
of the data
will be
maintained
and this
will affect
the
manageme
nt of the
data
storage in
ab better
manner
Project
Manager
Security Analysis: Risk Assessment and Mitigation Strategies_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ciphers are used here for a better performance
|9
|2746
|44

Computer Forensics and Security Fundamentals Coursework 1
|8
|1546
|185

Data Breaching and Risks in Cloud Computing - PRJM 6003 Assignment 1
|7
|3957
|483

Firewall Rules for Network Security: Accessing, Mitigating Virus Attack, VPN Access, VLAN Access, Blocking RFC 1918
|10
|922
|63

An Interim Report on: Securing a Local Area Network
|14
|2793
|72

COIT20262 - Advanced Network Security
|7
|1484
|89