Ask a question from expert

Ask now

IT Risk Management : Assignment

7 Pages1669 Words112 Views
   

Added on  2020-02-24

IT Risk Management : Assignment

   Added on 2020-02-24

BookmarkShareRelated Documents
Running head: IT RISK MANAGEMENTIT Risk ManagementName of the StudentName of the UniversityAuthor Note
IT Risk Management : Assignment_1
1 IT RISK MANAGEMENTTable of ContentsTopic 1- IT Security and Technology Landscape................................................................2Topic 2- IT Security Models and access controls................................................................3Topic 3- IT security Threat and Risk Assessment...............................................................4References............................................................................................................................6
IT Risk Management : Assignment_2
2 IT RISK MANAGEMENTTopic 1- IT Security and Technology Landscape IT security or data security is a major concern in every industry and organization. Thedata associated with the organization is needed to be protected in order to prevent the origin ofinformation security threat associated with a system. Information technology security or ITsecurity is a process of implementing different measures to protect and safeguard the informationassociated with the system. Information security management is a procedure of managing anorganization’s confidential data. IT security management is necessary to manage the riskssystematically (Von Solms & Van Niekerk, 2013). Information Technology enables a set of strategies used for managing the tools andprocedures necessary to detect and prevent the threats associated with the system. In order tomanage and protect the business processes and confidentiality of the data, proper informationsecurity is necessary. Confidential information associated with a system can be vulnerable to anumber of attacks. These attacks include virus and malware attacks apart from hacking, spoofingphishing and so on. In an organization, information technology devices includes, computer andassociated devices, servers, routers and switches that manages all the data and informationassociated with an organization. Information technology security deals with managing andcontrolling these sensitive data to prevent illegitimate or unauthorized uses. There are a numberof ways of maintaining the data security in an organization (Peltier, 2013). Certain organizationuses protected network or intranet to share their resources among all the employees of theorganization in a secure manner. This ensures that the data is not hacked or misused whiletransfer and also prevent the unauthorized access. Information Technology security is a complextask, as there is no place for mistake. This is particularly because it is not always possible for theorganization or its employees to circulate data only in the organization premises. Features such
IT Risk Management : Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Security and Risk Management | CNSS Security Model
|6
|1362
|197

Preventative Approaches to Hacking Information Technology
|14
|2907
|48

Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375

Fundamental Concepts of Digital Security and Security Mechanisms in a Digitally Networked Environment
|9
|1488
|52

iT Security
|17
|5127
|60

ITC596 - It Risk Management
|10
|1552
|83