logo

Information Security Threats and Risk Assessment

   

Added on  2020-02-24

7 Pages1669 Words112 Views
 | 
 | 
 | 
Running head: IT RISK MANAGEMENTIT Risk ManagementName of the StudentName of the UniversityAuthor Note
Information Security Threats and Risk Assessment_1

1 IT RISK MANAGEMENTTable of ContentsTopic 1- IT Security and Technology Landscape................................................................2Topic 2- IT Security Models and access controls................................................................3Topic 3- IT security Threat and Risk Assessment...............................................................4References............................................................................................................................6
Information Security Threats and Risk Assessment_2

2 IT RISK MANAGEMENTTopic 1- IT Security and Technology Landscape IT security or data security is a major concern in every industry and organization. Thedata associated with the organization is needed to be protected in order to prevent the origin ofinformation security threat associated with a system. Information technology security or ITsecurity is a process of implementing different measures to protect and safeguard the informationassociated with the system. Information security management is a procedure of managing anorganization’s confidential data. IT security management is necessary to manage the riskssystematically (Von Solms & Van Niekerk, 2013). Information Technology enables a set of strategies used for managing the tools andprocedures necessary to detect and prevent the threats associated with the system. In order tomanage and protect the business processes and confidentiality of the data, proper informationsecurity is necessary. Confidential information associated with a system can be vulnerable to anumber of attacks. These attacks include virus and malware attacks apart from hacking, spoofingphishing and so on. In an organization, information technology devices includes, computer andassociated devices, servers, routers and switches that manages all the data and informationassociated with an organization. Information technology security deals with managing andcontrolling these sensitive data to prevent illegitimate or unauthorized uses. There are a numberof ways of maintaining the data security in an organization (Peltier, 2013). Certain organizationuses protected network or intranet to share their resources among all the employees of theorganization in a secure manner. This ensures that the data is not hacked or misused whiletransfer and also prevent the unauthorized access. Information Technology security is a complextask, as there is no place for mistake. This is particularly because it is not always possible for theorganization or its employees to circulate data only in the organization premises. Features such
Information Security Threats and Risk Assessment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents