IT Risk Management : Assignment

Added on -2020-02-24

| 7 pages| 1669 words| 112 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 3 of 7 pages

Running head: IT RISK MANAGEMENTIT Risk ManagementName of the StudentName of the UniversityAuthor Note
1 IT RISK MANAGEMENTTable of ContentsTopic 1- IT Security and Technology Landscape................................................................2Topic 2- IT Security Models and access controls................................................................3Topic 3- IT security Threat and Risk Assessment...............................................................4References............................................................................................................................6
2 IT RISK MANAGEMENTTopic 1- IT Security and Technology Landscape IT security or data security is a major concern in every industry and organization. Thedata associated with the organization is needed to be protected in order to prevent the origin ofinformation security threat associated with a system. Information technology security or ITsecurity is a process of implementing different measures to protect and safeguard the informationassociated with the system. Information security management is a procedure of managing anorganization’s confidential data. IT security management is necessary to manage the riskssystematically (Von Solms & Van Niekerk, 2013). Information Technology enables a set of strategies used for managing the tools andprocedures necessary to detect and prevent the threats associated with the system. In order tomanage and protect the business processes and confidentiality of the data, proper informationsecurity is necessary. Confidential information associated with a system can be vulnerable to anumber of attacks. These attacks include virus and malware attacks apart from hacking, spoofingphishing and so on. In an organization, information technology devices includes, computer andassociated devices, servers, routers and switches that manages all the data and informationassociated with an organization. Information technology security deals with managing andcontrolling these sensitive data to prevent illegitimate or unauthorized uses. There are a numberof ways of maintaining the data security in an organization (Peltier, 2013). Certain organizationuses protected network or intranet to share their resources among all the employees of theorganization in a secure manner. This ensures that the data is not hacked or misused whiletransfer and also prevent the unauthorized access. Information Technology security is a complextask, as there is no place for mistake. This is particularly because it is not always possible for theorganization or its employees to circulate data only in the organization premises. Features such

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Premium

$45

Q&A Library Access

Chat support

12

Document Unlocks

4

Answer Unlocks

Students who viewed this