Ask a question from expert

Ask now

ITC596 | IT Risk Management

8 Pages1612 Words104 Views
   

Charles Sturt University

   

IT Risk Management (ITC596)

   

Added on  2020-03-04

About This Document

This assessment, tells how the technology landscape has become important in recent times and the software development team is developing multi-platform apps, they must ensure the security of these apps too. The scope or opportunities, a collection of data, detailed analysis of security policies, detailed analysis of the threats that occurred, vulnerability analysis, and the assessment of the risks associated with the applications have been well defined.

ITC596 | IT Risk Management

   

Charles Sturt University

   

IT Risk Management (ITC596)

   Added on 2020-03-04

BookmarkShareRelated Documents
Running head: IT RISK MANAGEMENTIT Risk ManagementName of the StudentName of the UniversityAuthor’s note
ITC596 | IT Risk Management_1
1IT RISK MANAGEMENTExecutive SummaryThe technology landscape has become important in recent times and the softwaredevelopment team is developing multi platform apps, they must ensure the security of theseapps too. These different security models have been discussed in this report. The securitythreat and the risk assessment associated with it have been discussed in this reportelaborately. The scope or opportunities, a collection of data, detail analysis of securitypolicies, detail analysis of the threats occurred, vulnerability analysis and the assessment ofthe risks associated with the applications have been well defined.
ITC596 | IT Risk Management_2
2IT RISK MANAGEMENTTable of Contents1. Introduction............................................................................................................................32. Discussion and justification of IT Security and Technology Landscape..............................33. Discussion and justification of IT Security Models and Access Controls.............................44. Discussion and justification of IT Security Threat and risk assessment................................55. Conclusion..............................................................................................................................66. References..............................................................................................................................7
ITC596 | IT Risk Management_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT-373 - Report on IT Security
|11
|2410
|51

ITC596 - IT Risk Management | Report
|11
|2081
|107

ITC596 - It Risk Management
|10
|1552
|83

IT Security & Technology Landscape | Assignment
|6
|1206
|80

Concepts of IT Security and the Technological Landscape Model Report
|7
|1248
|54

Cyber Security Management for Australian Red Cross Blood Service
|9
|1783
|385