Ask a question from expert

Ask now

Security & Risk Management Assignment

14 Pages2988 Words195 Views
   

Added on  2020-02-24

Security & Risk Management Assignment

   Added on 2020-02-24

BookmarkShareRelated Documents
Running head: IS SECURITY AND RISK MANAGEMENTIS Security and Risk ManagementName of the Student:Name of the University:Author note:
Security & Risk Management Assignment_1
1IS SECURITY AND RISK MANAGEMENTTable of ContentsIntroduction..........................................................................................................................3Definitions of key terms......................................................................................................3Models related to IT security in an organization.................................................................3IT and security standards in the organization......................................................................5Risk analysis........................................................................................................................6Security and network protocols...........................................................................................6Analysis of business process...............................................................................................7Analysis of contingency planning and risk analysis............................................................8Analysis of threat, vulnerabilities and tools........................................................................8Use of tools in the organization in reference of OSI layers.................................................9Conclusion.........................................................................................................................11References..........................................................................................................................12
Security & Risk Management Assignment_2
2IS SECURITY AND RISK MANAGEMENTIntroductionSafety measures cannot give guarantee 100% insurance against all dangers in anorganization. Thus, risk analysis is the way toward assessing system vulnerabilities and thethreats confronting it. Risk management is the procedure of actualizing and keeping upcountermeasures that lessen the impacts of hazard to a worthy level. The present study deals withrelated models, security standards as well as network protocols in an organization. In addition,threat, vulnerabilities and tools are discussed in the present study. Definitions of key termsOSI model: It is a open system interconnection model that characterizes as well asstandardizes functions of communication.IT Security policy: It can be defined as securing the system or organization. It identifiesconstraints on behavior of the system elements.Models related to IT security in an organizationSecurity models for control are utilized in order to decide the process of deployingsecurity and the subjects can get to the system, and what objects can be approached. Theapproach can formalize security policy (Webb et al. 2014). Security models of control can beimplemented by upholding integrity, confidentiality as well as different controls. It is essentialthat models’ lays out expansive rules will be utilized as well as in specific nature.State Machine level: The model is usually based on finite state machine. The machine isgenerally used to the complicated model systems as well as deals with acceptors, recognizer and
Security & Risk Management Assignment_3
3IS SECURITY AND RISK MANAGEMENTstate variables. In addition, state machine has ability to define behavior of finite number ofstates. The transactions between the states as well as actions can occur. Figure 1: State Machine level(Source: Olsson et al. 2016, p.241)One of the most common representations of the sate machine is through the state machinelevel. A state machine level can monitor status of the particular system in order to prevent thesystem from slipping into the state of insecure. The model is valued through understanding thestate of system. Information flow model
Security & Risk Management Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Risk and Management : Report
|10
|2760
|50

IT Security and Risk Management
|9
|1279
|33

An Interim Report on: Securing a Local Area Network
|14
|2793
|72

Risk Assessment Report- Docs
|11
|1091
|30

SBM4304 IT Security and Risk Management Assignment
|15
|3286
|97

CIS 608 - IS Information Security Management - Essay
|11
|3102
|443