IT Risk Assessment for Aztek
VerifiedAdded on 2019/11/26

IT RISK ASSESSMENT FOR AZTEK
Name of the Student
Name of the University
Author note
Paraphrase This Document

Executive summary
The aim of this report is t discuss abou the several risk factors present in a business. In this report
the present situation of Aztek regarding the risk factors has been discussed on the basis of a
project. Several risk factors and the main types of the risk factors are discussed in this report
along with the risk management methodologies. The main advantages of the risk mitigating
methods are also discussed in this report. Aztek is an Australian company which deals with
financial services. Several risk factors and the risk mitigations methods are discussed in this
report for the analysis of the system. It is concluded that new technologies and regulations should
be implemented in order to overcome the risk factors.
Table of Contents

Introduction......................................................................................................................................3
A review of the project....................................................................................................................4
A review of the project impact on the current security posture of Aztec........................................5
Risk factors......................................................................................................................................7
Specially address Risks for Data Security from the viewpoint in the project.................................8
Mitigation of risk factors.................................................................................................................9
Conclusion.....................................................................................................................................13
References......................................................................................................................................15
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Introduction
In present day time of web and data innovation the significance of data is expanding step
by step and the measure of dangers are likewise expanding at the same time. It is essential to
keep the security of the data identified with the data and the hierarchical structure. Dangers can
be arranged from multiple points of view as indicated by its tendency sort of event. To manage
different sorts of dangers distinctive strategies are taken to secure the authoritative set up. There
are likewise numerous contrasts between the hazard and the vulnerabilities as both can harm the
hierarchical well being to a substantial degree. Some associations and governments have made a
considerable measure of well being controls which are helpful to influence the association to free
from hazard factors. The principle explanations for making the measures are to make a solid
boundary to the hierarchical hazard. Dangers can be sparing, digital and normal and every one of
these sorts of dangers require distinctive sorts of security safety measures. The risk is considered
as the variables which are in charge of making the framework helpless. The outline clarifies
every one of the parts of the factors related to several risk. It indicates distinctive sorts of dangers
with illustrations and furthermore it decides the level of the hazard factors which connotes the
conceivable vulnerabilities caused by a hazard factor. The hazard variables can be ordered in a
few ways. The first is on the premise of the place of event of the hazard factors. A few dangers
can happen inside associations and a few dangers can happen outside of the associations. Those
dangers which occur outside the association are known as the outer hazard factors and those
dangers factors which undertaking place inside the association are known as the inner hazard
factors.
Paraphrase This Document

In this report the present situation of Aztek regarding the risk factors has been discussed
on the basis of this project. Aztek is an Australian company which deals with financial services.
Several risk factors and the risk mitigations methods are discussed in this report for the analysis
of the system.
A review of the project
There are numerous versatile saving money applications accessible today. Retail
managing an account and financier firms, for example, Bank of America and Fidelity
Investments have been utilizing versatile stages to offer applications that let clients remain avant-
garde on occasions, keep an eye on their portfolio possessions, and even start exchanges from
their cell phones (Poniszewska-Marańda 2014). Speculation administration firms have likewise
utilized the ascent of tablet gadgets as a chance to furnish their business powers with refreshed
documentation rapidly. The merging of versatile and money related industry where there are
various patterns that are empowering the union of the portable and the budgetary business. One
is the move towards Digital Wallet, which is an activity that enables clients to have computerized
cash in their cell phone or in the cloud. Another pattern originates from portable saving money,
which is picking up footing all through the world. Today, the lion's share of banks enable clients
to utilize their cell phones to check constrained data identified with their managing an account
yet this is certainly changing with expanding purchaser request, persistent arrival of new cell
phones and arrangement of safe and secure exchanges (Ross, Fielding and Louis 2014).
Changing security and advanced insurance requires a deliberate and gifted approach. We help
distinguish and relieve your environment by moderating danger, and examining advancing
consistence scenes to put the correct security and security controls set up, from client access
through information insurance for reinforcement and coherence necessities (Paton et al. 2014).

We offer workshops, appraisals, engineering, outline, and incorporation benefits as a piece of
Hybrid IT, Cloud, grounds system, versatility, and IoT changes. Today, many people are grown
up claim a cell phone or the like. As the mindfulness for necessity of portability arrangement
keeps on developing among money related businesses, we will see new open doors, for both
monetary establishments and buyers.
There are also many regulations which should be followed in case of both risk assessment
and the risk management.
• Conduct a hazard evaluation for all work in the working environment.
• Take sensibly practicable measures to take out or lessen security and wellbeing dangers.
• Establish safe work methods if the dangers can't be disposed of.
• Specify the parts and obligations of people associated with the usage of hazard control
measures and safe work methodology.
• Keep records of hazard appraisal.
• Inform representatives of the idea of the dangers included and any hazard control
measures or safe work strategies actualized.
• Review or overhaul hazard evaluation.
A review of the project impact on the current security posture of Aztec
Changing security and advanced insurance requires a deliberate and gifted approach
(McNeil, Frey and Embrechts 2015). We help distinguish and relieve your environment by
moderating danger, and examining advancing consistence scenes to put the correct security and
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

security controls set up, from client access through information insurance for reinforcement and
coherence necessities. We offer workshops, appraisals, engineering, outline, and incorporation
benefits as a piece of Hybrid IT, Cloud, grounds system, versatility, and IoT changes.
Consistence with ISO27001, ITIL or adherence to Cobit guidelines inside the IT capacity
may no longer alone be adequate to represent hazards over IT administrations, on the off chance
that they ever were (Lawrence et al. 2015).
Individuals' connection with innovation while outside work is a range not regularly
considered on hazard registers. For instance, the danger of staff sharing individual and
conceivably touchy organization data through long range informal communication locales may
incorporate data which can be utilized to trade off security on clients' corporate system accounts.
Huge volumes of information going from client buying propensities, to exchange
following logs have been developing inside corporate frameworks for a considerable length of
time, yet finished the following decade we will see a blast both the capacity and the open doors
for ventures to misuse this information (Howes et al. 2015). What has beforehand been a
differentiator will turn into an essential for survival. Information quality may progress toward
becoming as essential as item quality in figuring out which of the present undertakings are still
here in 2020.
The contradiction of hazard is opportunity and IT capacities which can viably deal with
their dangers will empower their organizations to fundamentally beat those organizations which
are put off by or essentially not up to the test (Kettl 2015). Organizations where IT feels engaged
to impact business basic leadership by exhibiting how business enablement can be driven by
viable administration of innovation dangers, will flourish enormously to the detriment of those
Paraphrase This Document

organizations where obliviousness or dread of new or changing innovation chance ranges either
keeps them from moving into new zones, or results in disappointments when they endeavor to.
This is the ideal opportunity for IT pioneers to advance up and put themselves and their capacity
at the focal point of driving their business forward.
Risk factors
Consistence with ISO27001, ITIL or adherence to Cobit guidelines inside the IT capacity
may no longer alone be adequate to represent hazards over IT administrations, on the off chance
that they ever were (Hopkin 2017). Individuals' connection with innovation while outside work
is a range not regularly considered on hazard registers. For instance, the danger of staff sharing
individual and conceivably touchy organization data through long range informal communication
locales may incorporate data which can be utilized to trade off security on clients' corporate
system accounts. Huge volumes of information going from client buying propensities, to
exchange following logs have been developing inside corporate frameworks for a considerable
length of time, yet finished the following decade we will see a blast both the capacity and the
open doors for ventures to misuse this information. What has beforehand been a differentiator
will turn into an essential for survival. Information quality may progress toward becoming as
essential as item quality in figuring out which of the present undertakings are still here in 2020.
The contradiction of hazard is opportunity and IT capacities which can viably deal with their
dangers will empower their organizations to fundamentally beat those organizations which are
put off by or essentially not up to the test. Organizations where IT feels engaged to impact
business basic leadership by exhibiting how business enablement can be driven by viable
administration of innovation dangers, will flourish enormously to the detriment of those
organizations where obliviousness or dread of new or changing innovation chance ranges either

keeps them from moving into new zones, or results in disappointments when they endeavour to
that. This is the ideal opportunity for IT pioneers to advance up and put themselves and their
capacity at the focal point of driving their business forward. Dangers can be sparing, digital and
normal and every one of these sorts of dangers require distinctive sorts of security safety
measures. The risk is considered as the variables which are in charge of making the framework
helpless. The outline clarifies every one of the parts of the factors related to several risk. It
indicates distinctive sorts of dangers with illustrations and furthermore it decides the level of the
hazard factors which connotes the conceivable vulnerabilities caused by a hazard factor. The
hazard variables can be ordered in a few ways. The first is on the premise of the place of event of
the hazard factors. A few dangers can happen inside associations and a few dangers can happen
outside of the associations. Those dangers which occur outside the association are known as the
outer hazard factors and those dangers factors which undertaking place inside the association are
known as the inner hazard factors.
Specially address Risks for Data Security from the viewpoint in the project
Presently the event of the hazard factors is likewise reliant upon the purposes for the
hazard factors. The hazard elements can be available due to some characteristic reasons and
unplanned reasons. The hazard components can likewise be available because of some deliberate
reasons made by human practices. Those dangers which are occurred because of the assault of
common reasons are called unplanned dangers and those dangers which are taken purposefully,
are called ponder hazard factors. Hacking, interruption and harms because of infections and
malware are called ponder chance elements. This hazard factor can be extremely hurtful for the
associations. If there should be an occurrence of inner hazard factors there are diverse sorts of
hazard factors. Those hazard elements can be of strategic hazard factors, corporate hazard
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

factors, chance factor identified with property administration, lodging hazard factors and
furthermore the monetary hazard factors. All these hazard factors are created because of the
inside exercises of the association. The primary explanations for the inner hazard factors are
reliant on the authoritative usefulness and the rationale of the representatives. There are
additionally many variables like the authoritative profitability and the kind of administration
which the association works. It is vital to recognize the hazard factors which are produced from
the association. It is likewise critical to discover the purposes for the hazard factors and
furthermore the thought processes of the workers for which a portion of the inside hazard factors
are produced. The association ought to be stricter in making the hierarchical strength and
security for more grounded holding of the workers with the association. Outside hazard factors
are additionally essential and ought to be handled with the assistance of more grounded guard
instrument. The outside hazard variables can be of a few sorts. The outside hazard factors
contain dangers identified with cataclysmic event and undesirable specialized issues like loss of
web and the loss of power. Fundamental issue identified with the outside hazard is the danger of
digital assault. There are many cases found in which programmers have stolen bunches of
information from the database of a few associations managing data innovation. The outside
hazard factors contain subsidizing, administrative venture, notoriety, chance identified with
association and the natural changes which can make the usefulness of the association harmed to
various degree in view of the level of the hazard factors. Hazard administration is an imperative
piece of the capacities identified with the safeguards taken by the associations. In hazard
administration the primary concern is to decide the first issues identified with the hierarchical
hazard factors and to decide the required arrangement so as to defeat the hazard factors.
Paraphrase This Document

Mitigation of risk factors
Hazard administration arranging should be a progressing exertion that can't stop
after a subjective hazard appraisal, or a Monte Carlo reproduction, or the setting of possibility
levels. Hazard administration incorporates front-end arranging of how real dangers will be
relieved and overseen once recognized (Bianco et al. 2017). Along these lines, hazard
moderation techniques and particular activity designs ought to be joined in the undertaking
execution design or hazard examinations is recently so much backdrop. It is now examined about
the dangers and the dangers which can be hurtful for the associations. The Victorian Protective
Data Security structure is the principle highlight of the directions which has given safeguards and
standard conventions against all the conceivable hazard factors which can be unsafe regarding
influencing the associations more to secure. The essential advance of making the association
further developed in security is to make the demonstrations and conventions in regards to people
in general data wellbeing and the defensive information security. For this situation the
fundamental highlights are composed in such a path along these lines, to the point that the laws
and the controls can be executed appropriately. The primary benchmarks take after a few
strategies to conquer the hierarchical structure which is essential if there should be an occurrence
of influencing the associations more to secure and solid. These measures are made with a
specific end goal to spare the four areas which are data, ICT, work force and the physical
security from different hazard factors. Each standard contain four conventions which are
likewise actualized with persistent alterations for better reaction. Principles and the data ought to
be dealt with preferred duty over the official resources. Data security and the ICT security ought
to be given most astounding need. This infers the compliance of the security by reflecting to the
association and the administrations. A few significances are given to chance administration and

the data esteem. Consistent change is a critical component of a few governments which tells
around four key variables and those are design, do, check and act. With the assistance of these
four factors the hazard examination and administration can be more powerful as far as
influencing the framework more to secure.
Describe the underlying drivers of dangers that have been distinguished and measured in
before periods of the hazard administration process (Davies 2014). Distinguish elective
moderation systems, techniques, and devices for each significant hazard. Evaluate and organize
relief choices. Select and confer the assets required for particular hazard relief choices.
Despite the fact that hazard alleviation designs might be created in detail and executed by
contractual workers, the proprietor's program and undertaking administration ought to create
principles for a reliable hazard moderation arranging process. Proprietors ought to have free,
unprejudiced outside specialists audit the undertaking's danger relief designs before definite
endorsement (Cole et al. 2013). This ought to be done before finishing the venture plan or
designating stores for development. Hazard alleviation arranging should proceed past the finish
of the undertaking by catching information and lessons discovered that can profit future
activities.
A few dangers, once recognized, can promptly be dispensed with or decreased.
Nonetheless, most dangers are substantially harder to relieve, especially high-affect, low-
likelihood dangers. In this way, hazard relief and administration should be long haul endeavours
by venture chiefs all through the task.
Be that as it may, when a venture has some vulnerability, a full-speed-ahead approach
may not be ideal. In such ventures, scope changes and iterative reusing of the plan are the
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

standard, not the exemption (Chance and Brooks 2015). Administrative issues additionally give a
ripe wellspring of vulnerability that can cause reasonable task arranging and configuration to
reuse commonly. For ventures with a high level of vulnerability, settled value contracts might be
unseemly, yet execution based motivation contracts can be utilized.
Inability to perceive and suspect changes, vulnerability, and cycle in getting ready
timetables and spending plans can prompt shocking outcomes. The strategies and aptitudes that
are fitting to traditional ventures frequently give poor outcomes when connected to ventures with
extraordinary potential for the Owner's Role in Project Risk Management was to design the
whole project and to create a system. The National Academies Press.
As an outrageous illustration, assume a specific undertaking is relied upon to cost $1,000,000 if a
specific occasion does not happen and $50,000,000 in the event that it does. One would
unquestionably not relegate a possibility of $49,000,000 to a $1,000,000 venture. In the event
that the likelihood of the occasion is evaluated as 0.02, the normal misfortune because of the
hazard occasion is $1,000,000 (Aldunce et al. 2015). One would not relegate this number as a
possibility either, in light of the fact that the evaluated cost with possibility would rise 100
percent to $2,000,000. On the off chance that the occasion happens, the possibility of $1,000,000
will be totally insufficient to cover it, with a setback of $49,000,000. On the off chance that the
occasion never happens, the extra $1,000,000 is probably going to be spent in any case, with the
goal that the net impact is essentially to twofold the cost of the venture.
High-affect, low-likelihood occasions must be moderated by decreasing the effect or the
probability, or both (Bianco et al. 2017). Be that as it may, hazard moderation and administration
absolutely are not taken a toll free. In the basic delineation above, it may be justified, despite all
Paraphrase This Document

the trouble to the proprietor to use as much as $1,000,000 more to alleviate the $50,000,000
hazard, and maybe more than $1,000,000 if the proprietor is extremely chance opposed. In
deciding the spending distribution expected to relieve high-affect, low-probability dangers, it is
important to recognize particular hazard relief exercises (Chance and Brooks 2015). These
exercises should then be incorporated into the venture spending plan and plan, and followed and
oversaw similarly as other basic undertaking exercises are overseen. Nonetheless, hazard
alleviation exercises may contrast from other venture exercises in that there might be some
vulnerability about whether the chose chance moderation procedures will work that is, the
exercises might be dependent upon whether the hazard relief systems are compelling. This has
prompted the improvement of an uncommon sort of system outline for hazard relief exercises,
known as the waterfall chart.
Conclusion
From the above discussion it is concluded that there are many risk factors present in the
IT and as well as several businesses and these risk factors can be of several types and can also
lead to several damages of the system. To overcome the risk factors there are also many risk
management methods which are to be implemented in order to make the system more safe. . It is
essential to keep the security of the data identified with the data and the hierarchical structure.
Dangers can be arranged from multiple points of view as indicated by its tendency sort of event.
To manage different sorts of dangers distinctive strategies are taken to secure the authoritative
set up. There are likewise numerous contrasts between the hazard and the vulnerabilities as both
can harm the hierarchical well being to a substantial degree. Some associations and governments
have made a considerable measure of well being controls which are helpful to influence the
association to free from hazard factors. The principle explanations for making the measures are

to make a solid boundary to the hierarchical hazard. Dangers can be sparing, digital and normal
and every one of these sorts of dangers require distinctive sorts of security safety measures. The
risk is considered as the variables which are in charge of making the framework helpless. The
outline clarifies every one of the parts of the factors related to several risk. It indicates distinctive
sorts of dangers with illustrations and furthermore it decides the level of the hazard factors which
connotes the conceivable vulnerabilities caused by a hazard factor. The hazard variables can be
ordered in a few ways. The first is on the premise of the place of event of the hazard factors. A
few dangers can happen inside associations and a few dangers can happen outside of the
associations. Those dangers which occur outside the association are known as the outer hazard
factors and those dangers factors which undertaking place inside the association are known as the
inner hazard factors. The essential advance of making the association further developed in
security is to make the demonstrations and conventions in regards to people in general data
wellbeing and the defensive information security. For this situation the fundamental highlights
are composed in such a path along these lines, to the point that the laws and the controls can be
executed appropriately. The primary benchmarks take after a few strategies to conquer the
hierarchical structure which is essential if there should be an occurrence of influencing the
associations more to secure and solid. These measures are made with a specific end goal to spare
the four areas which are data, ICT, work force and the physical security from different hazard
factors. Each standard contain four conventions which are likewise actualized with persistent
alterations for better reaction. Principles and the data ought to be dealt with preferred duty over
the official resources. Data security and the ICT security ought to be given most astounding
need.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Paraphrase This Document

References
Aldunce, P., Beilin, R., Howden, M., & Handmer, J. (2015). Resilience for disaster risk
management in a changing climate: Practitioners’ frames and practices. Global Environmental
Change, 30, 1-11.
American Diabetes Association. (2016). 8. Cardiovascular disease and risk management.
Diabetes care, 39(Supplement 1), S60-S71.
Becken, S., & Hughey, K. F. (2013). Linking tourism into emergency management structures to
enhance disaster risk reduction. Tourism Management, 36, 77-85.
Bianco, R. J., Arnoux, P. J., Wagnac, E., Mac-Thiong, J. M., & Aubin, C. É. (2017). Minimizing
pedicle screw pullout risks: a detailed biomechanical analysis of screw design and placement.
Clinical spine surgery, 30(3), E226-E232.
Brindley, C. (Ed.). (2017). Supply chain risk. Taylor & Francis.
Chance, D. M., & Brooks, R. (2015). Introduction to derivatives and risk management. Cengage
Learning.
Cole, S., Giné, X., Tobacman, J., Topalova, P., Townsend, R., & Vickery, J. (2013). Barriers to
household risk management: Evidence from India. American Economic Journal: Applied
Economics, 5(1), 104-135.
Davies, J. C. (2014). Comparing environmental risks: tools for setting government priorities.
Routledge.

DeAngelo, H., & Stulz, R. M. (2015). Liquid-claim production, risk management, and bank
capital structure: Why high leverage is optimal for banks. Journal of Financial Economics,
116(2), 219-236.
Ferguson, B. C., Brown, R. R., Frantzeskaki, N., de Haan, F. J., & Deletic, A. (2013). The
enabling institutional context for integrated water management: Lessons from Melbourne. Water
research, 47(20), 7300-7314.
Glendon, A. I., Clarke, S., & McKenna, E. (2016). Human safety and risk management. Crc
Press.
Heazle, M., Tangney, P., Burton, P., Howes, M., Grant-Smith, D., Reis, K., & Bosomworth, K.
(2013). Mainstreaming climate change adaptation: An incremental approach to disaster risk
management in Australia. Environmental Science & Policy, 33, 162-170.
Holt, T. J., Smirnova, O., Chua, Y. T., & Copes, H. (2015). Examining the risk reduction
strategies of actors in online criminal markets. Global Crime, 16(2), 81-103.
Hopkin, P. (2017). Fundamentals of risk management: understanding, evaluating and
implementing effective risk management. Kogan Page Publishers.
Howard, D. L., & Beasley, L. M. (2017). Pregnant with a perforated levonorgestrel intrauterine
system and visible threads at the cervical os. BMJ Case Reports, 2017, bcr-2017.
Howes, M., Tangney, P., Reis, K., Grant-Smith, D., Heazle, M., Bosomworth, K., & Burton, P.
(2015). Towards networked governance: improving interagency communication and
collaboration for disaster risk management and climate change adaptation in Australia. Journal of
Environmental Planning and Management, 58(5), 757-776.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Kettl, D. F. (2015). The job of government: Interweaving public functions and private hands.
Public Administration Review, 75(2), 219-229.
Lam, J. (2014). Enterprise risk management: from incentives to controls. John Wiley & Sons.
Lawrence, J., Sullivan, F., Lash, A., Ide, G., Cameron, C., & McGlinchey, L. (2015). Adapting
to changing climate risk by local government in New Zealand: institutional practice barriers and
enablers. Local Environment, 20(3), 298-320.
McNeil, A. J., Frey, R., & Embrechts, P. (2015). Quantitative risk management: Concepts,
techniques and tools. Princeton university press.
Paton, D., Johnston, D., Mamula-Seadon, L., & Kenney, C. M. (2014). Recovery and
development: perspectives from New Zealand and Australia. In Disaster and development (pp.
255-272). Springer International Publishing.
Poniszewska-Marańda, A. (2014). Selected aspects of security mechanisms for cloud
computing–current solutions and development perspectives.
Pritchard, C. L., & PMP, P. R. (2014). Risk management: concepts and guidance. CRC Press.
Reason, J. (2016). Managing the risks of organizational accidents. Routledge.
Renz, D. O. (2016). The Jossey-Bass handbook of nonprofit leadership and management. John
Wiley & Sons.
Riedlinger, M., & Rea, J. (2015). Discourse ecology and knowledge niches: Negotiating the risks
of radiation in online Canadian forums, post-Fukushima. Science, Technology, & Human
Values, 40(4), 588-614.
Paraphrase This Document

Ross, V. L., Fielding, K. S., & Louis, W. R. (2014). Social trust, risk perceptions and public
acceptance of recycled water: Testing a social-psychological model. Journal of environmental
management, 137, 61-68.
Tadeusiewicz, R., & Horzyk, A. (2014, November). Man-Machine Interaction Improvement by
Means of Automatic Human Personality Identification. In IFIP International Conference on
Computer Information Systems and Industrial Management (pp. 278-289). Springer, Berlin,
Heidelberg.
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
© 2024 | Zucol Services PVT LTD | All rights reserved.