Limited-time offer! Save up to 50% Off | Solutions starting at $6 each  

IT Risk Management : Assignment

Added on - 23 Feb 2020

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 3 of 7 pages
Running head: IT RISK MANAGEMENTIT Risk ManagementName of the StudentName of the UniversityAuthor Note
1IT RISK MANAGEMENTTable of ContentsTopic 1- IT Security and Technology Landscape................................................................2Topic 2- IT Security Models and access controls................................................................3Topic 3- IT security Threat and Risk Assessment...............................................................4References............................................................................................................................6
2IT RISK MANAGEMENTTopic 1- IT Security and Technology LandscapeIT security or data security is a major concern in every industry and organization. Thedata associated with the organization is needed to be protected in order to prevent the origin ofinformation security threat associated with a system. Information technology security or ITsecurity is a process of implementing different measures to protect and safeguard the informationassociated with the system. Information security management is a procedure of managing anorganization’s confidential data. IT security management is necessary to manage the riskssystematically (Von Solms & Van Niekerk, 2013).Information Technology enables a set of strategies used for managing the tools andprocedures necessary to detect and prevent the threats associated with the system. In order tomanage and protect the business processes and confidentiality of the data, proper informationsecurity is necessary. Confidential information associated with a system can be vulnerable to anumber of attacks. These attacks include virus and malware attacks apart from hacking, spoofingphishing and so on. In an organization, information technology devices includes, computer andassociated devices, servers, routers and switches that manages all the data and informationassociated with an organization. Information technology security deals with managing andcontrolling these sensitive data to prevent illegitimate or unauthorized uses. There are a numberof ways of maintaining the data security in an organization (Peltier, 2013). Certain organizationuses protected network or intranet to share their resources among all the employees of theorganization in a secure manner. This ensures that the data is not hacked or misused whiletransfer and also prevent the unauthorized access. Information Technology security is a complextask, as there is no place for mistake. This is particularly because it is not always possible for theorganization or its employees to circulate data only in the organization premises. Features such
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document