Running head: IT RISK MANAGEMENTIT Risk ManagementName of the StudentName of the UniversityAuthor Note
1 IT RISK MANAGEMENTTable of ContentsTopic 1- IT Security and Technology Landscape................................................................2Topic 2- IT Security Models and access controls................................................................3Topic 3- IT security Threat and Risk Assessment...............................................................4References............................................................................................................................6
2 IT RISK MANAGEMENTTopic 1- IT Security and Technology Landscape IT security or data security is a major concern in every industry and organization. Thedata associated with the organization is needed to be protected in order to prevent the origin ofinformation security threat associated with a system. Information technology security or ITsecurity is a process of implementing different measures to protect and safeguard the informationassociated with the system. Information security management is a procedure of managing anorganization’s confidential data. IT security management is necessary to manage the riskssystematically (Von Solms & Van Niekerk, 2013). Information Technology enables a set of strategies used for managing the tools andprocedures necessary to detect and prevent the threats associated with the system. In order tomanage and protect the business processes and confidentiality of the data, proper informationsecurity is necessary. Confidential information associated with a system can be vulnerable to anumber of attacks. These attacks include virus and malware attacks apart from hacking, spoofingphishing and so on. In an organization, information technology devices includes, computer andassociated devices, servers, routers and switches that manages all the data and informationassociated with an organization. Information technology security deals with managing andcontrolling these sensitive data to prevent illegitimate or unauthorized uses. There are a numberof ways of maintaining the data security in an organization (Peltier, 2013). Certain organizationuses protected network or intranet to share their resources among all the employees of theorganization in a secure manner. This ensures that the data is not hacked or misused whiletransfer and also prevent the unauthorized access. Information Technology security is a complextask, as there is no place for mistake. This is particularly because it is not always possible for theorganization or its employees to circulate data only in the organization premises. Features such
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
IT Security and Risk Management | CNSS Security Modellg...
|6
|1362
|197
Preventative Approaches to Hacking Information Technologylg...
|14
|2907
|48
Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Securitylg...
|12
|3215
|375
Fundamental Concepts of Digital Security and Security Mechanisms in a Digitally Networked Environmentlg...