logo

CSS 111 - IT Risk Management - Report

   

Added on  2020-03-04

7 Pages757 Words50 Views
Running head: IT SECURITY RISKIT Security RiskName of the StudentName of the UniversityAuthor’s Note:

1IT SECURITY RISKTable of ContentsIntroduction......................................................................................................................................2Discussion........................................................................................................................................2Conclusion.......................................................................................................................................4References........................................................................................................................................5

2IT SECURITY RISKIntroductionInformation technology is the utilization of systems to handle, store and retrieveinformation. Risks that are related to information technology are known as informationtechnology risks or IT risks (Alhawari et al., 2012). These types of risks are extremely commonin information technology. However, these risks can be reduced with different approaches. Thisreport outlines the various approaches to reduce risks in information technology.DiscussionThe application of the methods of risk management is known as IT risk management. Theinformation technology risks can be controlled with various and different approaches. Thedifferent risks of information technology are as follows:i)Obsolete operating systems: The outdated and obsolete operating system is a major threat andrisk in information technology.ii) Lack of encryption: The lack of encryption of the important and the confidential messages isanother major threat in information technology (Venkatesh, Thong & Xu, 2012).iii) Using other’s phones or tablets: Opening various confidential applications in electronicdevices that are not owned by the user is another basic threat in information technology.iv) Over-reliance on security scanning devices: Dependency on the software or devices thatmonitor security completely is another threat or risk in information technology.v) Insufficient logging of system: Insufficient system logging is another major threat ininformation technology.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Data Communications - Sample Assignment
|17
|4086
|68

Home Network Vulnerabilities
|5
|858
|297

Implementation of Different Firewall Technologies: Advantages and Disadvantages
|6
|2344
|50

Assignment | Cyber Security
|23
|2174
|14

Entity Management Service for Internet of Things-Based
|8
|2105
|22

Creating a Company Culture for Security - Security steps and methods for an organization
|4
|534
|193