logo

IT Risk Management Security System

17 Pages3744 Words61 Views
   

Added on  2020-02-19

IT Risk Management Security System

   Added on 2020-02-19

ShareRelated Documents
Running head: IT RISK MANAGEMENTIT Risk ManagementName of the StudentName of the UniversityAuthor Note
IT Risk Management Security System_1
1 IT RISK MANAGEMENTTable of ContentsIntroduction..........................................................................................................................31. Diagram to Illustrate the Security Issues in VIC.............................................................32. Risk Areas........................................................................................................................42.1 Exposure of Risk........................................................................................................52.1.1 High Risk Area...................................................................................................52.1.2. Medium Risk Area.............................................................................................52.1.3 Low Risk Areas..................................................................................................63. Deliberate and Accidental Threats...................................................................................63.1. Deliberate Threats.....................................................................................................63.2 Accidental Threats.....................................................................................................63.3 Risk Ranking.............................................................................................................74. Security/ Risk management Issues in the organization...................................................84.1 Internal Security/ Risk Management.........................................................................84.2. External Security/Risk Management........................................................................94.3 The Risk Management Strategy for VIC...................................................................95. Risk Vs Uncertainty......................................................................................................105.1 Risk..........................................................................................................................105.2. Uncertainty.............................................................................................................116. Risk Control and Risk Mitigation..................................................................................11
IT Risk Management Security System_2
2 IT RISK MANAGEMENT6.1. Risk Mitigation: Risk Transfer...............................................................................116.2. Risk Mitigation: Risk Control................................................................................126.3. Risk Mitigation: Risk Avoidance...........................................................................126.4 Risk Mitigation: Risk Monitoring...........................................................................12Conclusion.........................................................................................................................12References..........................................................................................................................14
IT Risk Management Security System_3
3 IT RISK MANAGEMENTIntroductionThe report focuses on the information security system of the VIC government that isfacing certain information security risks. The issue is important because the confidentialinformation of the Victorian government should be properly protected in order prevent the databreach and the loss of data and information (Healey, 2016). The report discusses the currentsecurity risks Victorian government is facing and the area of risk exposure. The problems thatVictorian government might face due to its exposure towards the deliberate and the accidentalthreats are elaborated in the report. Enforcement of a proper data security standard is essential forprotection and security of the confidential information of a system. The report discusses the areaof high, medium and low risks penetrating in the system. Furthermore, the report contains adiagrammatic representation of the risks, the government is exposed to and their possible causes.The information security system should be efficient enough to prevent the threats frompenetrating into the system. The Threats, risks and the risk management plan of the Victoriangovernment is elaborated in the following paragraphs. 1. Diagram to Illustrate the Security Issues in VIC
IT Risk Management Security System_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(solved) IT Risk Management PDF
|15
|3652
|47

Security Threats and Its Ranking in VIC Government : Report
|16
|3697
|45

Security Risks and Concerns 8/28/2017 Introduction 3 Security Risks and Concerns Diagram
|11
|3156
|439

EPM 5630 - Risk Assessment and Analysis of VIC Australian Government
|14
|3488
|113

itc596 - Risk faced by VIC Government - Report
|15
|2864
|45

Detailed Explanation of Risk Exposure Area 5 4. Analysis of Deliberate and Accidental Threats in Victoria Government
|15
|2687
|458