logo

Cyber Security 2022 Assessment

   

Added on  2022-09-26

9 Pages1875 Words36 Views
Running head: CYBER SECURITY
CYBER SECURITY
Name of the Student
Name of the Organization
Author Note

CYBER SECURITY
1
Table of Contents
Importance of the assessment of risk.........................................................................................2
Identification of the Critical asset..............................................................................................2
Template.....................................................................................................................................3
Identification of threat................................................................................................................4
Threat Landscape for the Website..............................................................................................5
References..................................................................................................................................7

CYBER SECURITY
2
Importance of the assessment of risk
Assessment of risk is considered to be a particular term that can be utilised for
describing the entire overall procedure or rather the method where all the several hazards and
also the factors of risks can be identified that possess with the huge potential of causing harm.
It can be said that a cyber-security assessment will be basically a procedure of the
identification, analysis and also the evaluation of the risk (Arachchilage and Love 2014). This
is considered to be the only way of ensuring about the fact that all the several controls of
cyber security which will be chosen must be proper to all the several risks which the
educational institution will be facing. A cyber security assessment of risk will be identifying
all the several assets of information that be highly affected by a kind of cyber-attack like that
of several hardware, software, computer systems and the data of the students. It may be
becoming slight difficult to give a proper training to the team that will be handling with the
risk associated activities or rather the assessment of risk (Conteh and Schmick 2016). Both
the estimation as well as the evaluation of risk is very much essential to be well performed
which will be followed by the process of selecting controls for treating all the risks which
will be identified. It is essential to both review as well as monitor the specific environment of
the educational institute concerned of a various kinds of risks for detecting any kinds of
alternations within the organization and also for maintaining an overview of the entire
procedure of the management of risk (Hartmann and Steup 2013). It is to be well remembered
that the specific feasibility of utilising the assessment of risk acts as a beautiful aid to the
particular procedure of the decision making.
Identification of the Critical asset
An asset of information can be defined as a particular body of the knowledge that will
be both managed as well as organized as a singular entity (Shamala, Ahmad and Yusoff

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security And Assessment of Risk
|10
|2256
|21

Cyber Security Assessment 2022
|10
|2116
|38

Cyber Security Assessment 20222
|9
|1846
|19

Assessment on Cyber Security 2022
|8
|1799
|18

Creation of a Cyber-Security Program
|15
|2625
|17

Cyber and Digital Risk as Board Level Responsibility
|11
|3352
|87