Detailed Risk Assessment and Analysis for VIC Government Systems
VerifiedAdded on  2020/02/24
|14
|3485
|43
Report
AI Summary
This report provides a comprehensive risk assessment and analysis of the information systems within the VIC Government. It begins with an illustration of security risks and threats, followed by an explanation of a diagram categorizing risk factors into accidental and deliberate threats, as well as internal and external threats. The report then compares and ranks accidental and deliberate threats, highlighting their potential impact on the system. It further discusses the security and risk management challenges faced by the VIC government, including operational challenges. The analysis also explores the differences between risk and uncertainty and concludes with a discussion on risk mitigation and management strategies. The report uses the created diagram using Ms-Visio software, which includes the factors of risk or threats for implementation of the information system in VIC Government, the diagram includes the factors of accidental and deliberate threats such as failure of outsourced operations, staff errors, technical failures, industrial action, theft and fraud, piracy of software, unauthorized software, unauthorized access, denial of service, programming errors, loss of information, failure of communication, transmission errors, website intrusion, malwares, eavesdropping, and social engineering issue.

Running head: RISK ASSESSMENT AND ANALYSIS
Risk Assessment and Analysis
Name of the Student:
Student ID:
Name of the University:
Author’s note:
Risk Assessment and Analysis
Name of the Student:
Student ID:
Name of the University:
Author’s note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1RISK ASSESSMENT AND ANALYSIS
Table of Contents
Introduction......................................................................................................................................2
1. Illustration of Security Risks and Threats in VIC Government..................................................2
2. Explanation of the Diagram and Categorization of Risk Factors................................................3
2.1 Description of the components of diagram............................................................................3
2.2 Classification of Risk Exposure Areas..................................................................................7
3. Comparison and Ranking of Accidental and Deliberate Threats................................................8
4. Security and Risk Management Challenges for VIC government...............................................9
5. Comparing Risk and Uncertainty................................................................................................9
6. Risk Mitigation and Management.............................................................................................10
Conclusion.....................................................................................................................................11
References......................................................................................................................................12
Table of Contents
Introduction......................................................................................................................................2
1. Illustration of Security Risks and Threats in VIC Government..................................................2
2. Explanation of the Diagram and Categorization of Risk Factors................................................3
2.1 Description of the components of diagram............................................................................3
2.2 Classification of Risk Exposure Areas..................................................................................7
3. Comparison and Ranking of Accidental and Deliberate Threats................................................8
4. Security and Risk Management Challenges for VIC government...............................................9
5. Comparing Risk and Uncertainty................................................................................................9
6. Risk Mitigation and Management.............................................................................................10
Conclusion.....................................................................................................................................11
References......................................................................................................................................12

2RISK ASSESSMENT AND ANALYSIS
Introduction
The information system development had been largely responsible for the development
of the effective and smart operations of the organization. The deployment of the effective and
smart operations would be helpful for carving the systematic flow of operations and integrating
the systematic flow of the diagram. The employment of the effective operations would result in
forming the deployment of the operations of the organization. The flow of the operations would
form the major implementation of the information system.
The report would be developed for forming the analysis of the various risk factors and
their impact on the development of the operations. The implementation of the operations would
be helpful in forming the effective development of the functions in the organization. The
development of the improved services would be the primary concern for the development and
implementation of the information system. This report would highlight the development of the
improved services in the organization and it would help in integrating the existing functions of
the VIC.
1. Illustration of Security Risks and Threats in VIC Government
The following diagram would be helpful in analysis of the risk factors for VIC
government as it had highlighted the major factors of the risk and threats to the information
system implementation in VIC Government,
Introduction
The information system development had been largely responsible for the development
of the effective and smart operations of the organization. The deployment of the effective and
smart operations would be helpful for carving the systematic flow of operations and integrating
the systematic flow of the diagram. The employment of the effective operations would result in
forming the deployment of the operations of the organization. The flow of the operations would
form the major implementation of the information system.
The report would be developed for forming the analysis of the various risk factors and
their impact on the development of the operations. The implementation of the operations would
be helpful in forming the effective development of the functions in the organization. The
development of the improved services would be the primary concern for the development and
implementation of the information system. This report would highlight the development of the
improved services in the organization and it would help in integrating the existing functions of
the VIC.
1. Illustration of Security Risks and Threats in VIC Government
The following diagram would be helpful in analysis of the risk factors for VIC
government as it had highlighted the major factors of the risk and threats to the information
system implementation in VIC Government,
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3RISK ASSESSMENT AND ANALYSIS
Figure 1: Factors of Risk and Threats in information system of VIC Government
(Source: Created by the author in Ms-Visio)
2. Explanation of the Diagram and Categorization of Risk Factors
2.1 Description of the components of diagram
The diagram had been developed by using the Ms-Visio Software and it includes all the
major components of the risk or threats for implementation of the information system in VIC
Government. The risk analysis had considered the threats and its classification in accidental and
deliberate. However, the risk can be classified into internal and external risks depending on the
source of the actions. The brief explanation of the components used in the diagram is given
below,
Figure 1: Factors of Risk and Threats in information system of VIC Government
(Source: Created by the author in Ms-Visio)
2. Explanation of the Diagram and Categorization of Risk Factors
2.1 Description of the components of diagram
The diagram had been developed by using the Ms-Visio Software and it includes all the
major components of the risk or threats for implementation of the information system in VIC
Government. The risk analysis had considered the threats and its classification in accidental and
deliberate. However, the risk can be classified into internal and external risks depending on the
source of the actions. The brief explanation of the components used in the diagram is given
below,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4RISK ASSESSMENT AND ANALYSIS
VIC Government: The users of the implemented information system can be represented
as the VIC government in the diagram. The data and information stored in the information
system are stored for the VIC government. The government acts as the primary stakeholder for
the information system and it serves the role of user and sponsor (Von Solms & Van Niekerk,
2013). Moreover, the most crucial impact of the implementation of the information system is on
the members of VIC Government whose data has been stored in the organization. The VIC
government symbolizes the number of persons and government departments whose data and
information would be stored on the implemented information system.
Information Management System: The system that has been implemented for VIC
government is Information Management System. The information management system would
comprise of developing the effective and smart operations for VIC government. The information
management system would help the government for carrying out smoother operations. According
to Bommer, Crowley and Pinho (2015), the implementation of the operations of information
management system would form the base of storage and access to data for VIC Government. The
development of the operations would also form the influence of the improved processes for
integrating the operations and development of the improvement facilities.
Codes of Practices: The code of practice is a basic set of norms and rules developed by
the government computer society for being able to stimulate and develop the improvement plan
of operations in the system. The code of practices has been set by Australian Computer Society
for managing the integrity of operations related to computer devices. The code of practice is
termed as ISO/IEC.AC/AZS 17799:2001 and it results in development of the ethically correct
and cohesive practices of the operations. The implication of the smart processing would help in
forming the development of the system integration for the organizational processing.
VIC Government: The users of the implemented information system can be represented
as the VIC government in the diagram. The data and information stored in the information
system are stored for the VIC government. The government acts as the primary stakeholder for
the information system and it serves the role of user and sponsor (Von Solms & Van Niekerk,
2013). Moreover, the most crucial impact of the implementation of the information system is on
the members of VIC Government whose data has been stored in the organization. The VIC
government symbolizes the number of persons and government departments whose data and
information would be stored on the implemented information system.
Information Management System: The system that has been implemented for VIC
government is Information Management System. The information management system would
comprise of developing the effective and smart operations for VIC government. The information
management system would help the government for carrying out smoother operations. According
to Bommer, Crowley and Pinho (2015), the implementation of the operations of information
management system would form the base of storage and access to data for VIC Government. The
development of the operations would also form the influence of the improved processes for
integrating the operations and development of the improvement facilities.
Codes of Practices: The code of practice is a basic set of norms and rules developed by
the government computer society for being able to stimulate and develop the improvement plan
of operations in the system. The code of practices has been set by Australian Computer Society
for managing the integrity of operations related to computer devices. The code of practice is
termed as ISO/IEC.AC/AZS 17799:2001 and it results in development of the ethically correct
and cohesive practices of the operations. The implication of the smart processing would help in
forming the development of the system integration for the organizational processing.

5RISK ASSESSMENT AND ANALYSIS
Risk and Threats: Bommer, Crowley and Pinho (2015) defined risk as those factors that
have a considerable impact of accelerating or retarding the flow of operations in the
organization. The threats can be consider as the factors having immediate danger for the
completion of the operations. The systematic flow of operations in the information system would
be halted due to the various processes of the operations. The threats have endangered the security
and privacy of the operations of the organization. The implementation of the operations would
divulge due to the impact of the threats on the operation of the organization. The various threats
and risks in the implementation of information system for VIC Government are failure of
outsourced operations, staff errors, technical failures, industrial action, theft and fraud, piracy of
software, unauthorized software, unauthorized access, denial of service, programming errors,
loss of information, failure of communication, transmission errors, website intrusion, malwares,
eavesdropping, and social engineering issue.
Accidental and Deliberate Threats: The risk analysis had considered the threats and its
classification in accidental and deliberate. Alcorn, Good and Pain (2013) have contrasted
accidental and deliberate threats as two factors. The accidental threats would serve the
classification of the operations gone wrong. The accidental threats would be developed without
any intention of harming the information system in the organization. The development of the
effective and smart operations would be helpful for critically evaluating the operations in the
organization. The accidental threats would hinder the effective and smart processing of the
information in VIC government. Some of the accidental threats of the VIC information
management system implementation are failure of outsourced operations, staff errors, technical
failures, loss of information, transmission errors, failure of communication, and programming
errors. On the contrary deliberate threats are intentionally done activities that had been done for
Risk and Threats: Bommer, Crowley and Pinho (2015) defined risk as those factors that
have a considerable impact of accelerating or retarding the flow of operations in the
organization. The threats can be consider as the factors having immediate danger for the
completion of the operations. The systematic flow of operations in the information system would
be halted due to the various processes of the operations. The threats have endangered the security
and privacy of the operations of the organization. The implementation of the operations would
divulge due to the impact of the threats on the operation of the organization. The various threats
and risks in the implementation of information system for VIC Government are failure of
outsourced operations, staff errors, technical failures, industrial action, theft and fraud, piracy of
software, unauthorized software, unauthorized access, denial of service, programming errors,
loss of information, failure of communication, transmission errors, website intrusion, malwares,
eavesdropping, and social engineering issue.
Accidental and Deliberate Threats: The risk analysis had considered the threats and its
classification in accidental and deliberate. Alcorn, Good and Pain (2013) have contrasted
accidental and deliberate threats as two factors. The accidental threats would serve the
classification of the operations gone wrong. The accidental threats would be developed without
any intention of harming the information system in the organization. The development of the
effective and smart operations would be helpful for critically evaluating the operations in the
organization. The accidental threats would hinder the effective and smart processing of the
information in VIC government. Some of the accidental threats of the VIC information
management system implementation are failure of outsourced operations, staff errors, technical
failures, loss of information, transmission errors, failure of communication, and programming
errors. On the contrary deliberate threats are intentionally done activities that had been done for
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6RISK ASSESSMENT AND ANALYSIS
harming the operations of the organization (Von Solms & Van Niekerk, 2013). The development
of the effective and smart operations would be helpful for critically evaluating the operations in
the organization. The deliberate threats would hinder the security and privacy of the information
in VIC government. Some of the deliberate threats of the VIC information management system
implementation are unauthorized software, eavesdropping, theft and fraud, website intrusion,
piracy of software, unauthorized access, social engineering issue, industrial action, malwares,
and denial of service.
External and Internal Threats: As opined by Lam (2014), the risk factors in the
implementation of the information system at VIC can be classified into external and internal
threats. Man et al. (2013) have defined external threats for the VIC government as the external
factors that have affected the development of the system privacy and security. These factors have
significant influence in hindering the development of the effective and smart operations. The
various threats of external threat are denial of service, technical failures, unauthorized access,
programming errors, transmission errors, website intrusion, malwares, and eavesdropping. The
implication of the internal threats would be implied for hindering the development of the
operations and it would form the major influence in critical evaluation of the information system.
The internal factors would benefit the implication of the operations and it would form the
hindrance of the operations in the development of the information system (Alcorn, Good & Pain,
2013). The various threats of internal threat are failure of outsourced operations, staff errors,
unauthorized software, social engineering issue, loss of information, piracy of software, failure
of communication, and industrial action.
harming the operations of the organization (Von Solms & Van Niekerk, 2013). The development
of the effective and smart operations would be helpful for critically evaluating the operations in
the organization. The deliberate threats would hinder the security and privacy of the information
in VIC government. Some of the deliberate threats of the VIC information management system
implementation are unauthorized software, eavesdropping, theft and fraud, website intrusion,
piracy of software, unauthorized access, social engineering issue, industrial action, malwares,
and denial of service.
External and Internal Threats: As opined by Lam (2014), the risk factors in the
implementation of the information system at VIC can be classified into external and internal
threats. Man et al. (2013) have defined external threats for the VIC government as the external
factors that have affected the development of the system privacy and security. These factors have
significant influence in hindering the development of the effective and smart operations. The
various threats of external threat are denial of service, technical failures, unauthorized access,
programming errors, transmission errors, website intrusion, malwares, and eavesdropping. The
implication of the internal threats would be implied for hindering the development of the
operations and it would form the major influence in critical evaluation of the information system.
The internal factors would benefit the implication of the operations and it would form the
hindrance of the operations in the development of the information system (Alcorn, Good & Pain,
2013). The various threats of internal threat are failure of outsourced operations, staff errors,
unauthorized software, social engineering issue, loss of information, piracy of software, failure
of communication, and industrial action.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7RISK ASSESSMENT AND ANALYSIS
2.2 Classification of Risk Exposure Areas
Lam (2014) has classified the area of the impact of risk in terms of high, medium,
medium-low, and low risk exposure areas. The implementation of the information system for
VIC government would be implied for the development of the information system. The
classification would form the implication of the information system and development of the
analysis of the risk exposure areas. The High Risk Exposure Areas are factors of risk that have
critical impact on the operations of the organization and it had resulted in forming the
development of the serious concerns for the VIC government organization. The implementation
of the information system would have to face the high probability of the occurrence of the
development of operations. The high risk exposure areas are intrusion, phishing, malware, and
data theft. The Medium Risk Exposure Areas are the factors of risk that have moderate impact
on the operations of the organization and it has resulted in forming major impact on the
operations of the organization. The VIC government organization would result in forming the
lower probability of the occurrence of operations. The medium risk exposure areas are issues of
design, data misinterpretation, and software issues. The Medium Low Risk Exposure Areas
are the factors of risk that have minor impact on the operations of the organization and it has
resulted in forming minor impact on the operations of the organization. The VIC government
organization would result in forming low probability of occurrence of operations. The medium
low risk exposure areas are wrong data entry, data incompatibility, and integration issue. The
Low Risk Exposure Areas are the factors of risk that have no significant impact on the
operations of the organization and it has resulted in forming least impact on the operations of the
organization. The VIC government organization would result in forming lowest probability of
2.2 Classification of Risk Exposure Areas
Lam (2014) has classified the area of the impact of risk in terms of high, medium,
medium-low, and low risk exposure areas. The implementation of the information system for
VIC government would be implied for the development of the information system. The
classification would form the implication of the information system and development of the
analysis of the risk exposure areas. The High Risk Exposure Areas are factors of risk that have
critical impact on the operations of the organization and it had resulted in forming the
development of the serious concerns for the VIC government organization. The implementation
of the information system would have to face the high probability of the occurrence of the
development of operations. The high risk exposure areas are intrusion, phishing, malware, and
data theft. The Medium Risk Exposure Areas are the factors of risk that have moderate impact
on the operations of the organization and it has resulted in forming major impact on the
operations of the organization. The VIC government organization would result in forming the
lower probability of the occurrence of operations. The medium risk exposure areas are issues of
design, data misinterpretation, and software issues. The Medium Low Risk Exposure Areas
are the factors of risk that have minor impact on the operations of the organization and it has
resulted in forming minor impact on the operations of the organization. The VIC government
organization would result in forming low probability of occurrence of operations. The medium
low risk exposure areas are wrong data entry, data incompatibility, and integration issue. The
Low Risk Exposure Areas are the factors of risk that have no significant impact on the
operations of the organization and it has resulted in forming least impact on the operations of the
organization. The VIC government organization would result in forming lowest probability of

8RISK ASSESSMENT AND ANALYSIS
occurrence of operations. The low risk exposure areas are social engineering issues and errors
generated by the users.
3. Comparison and Ranking of Accidental and Deliberate Threats
Accidental and Deliberate threats for the VIC government information system
implementation is compared in the table below,
Rank Description Examples Justification of
ranking
1st The deliberate threats are
intentionally done activities
that had been done for
harming the operations of the
organization (Von Solms &
Van Niekerk, 2013).
The deliberate threats would
hinder the security and
privacy of the information in
VIC government.
Some of the deliberate threats of
the VIC information management
system implementation are
unauthorized software,
eavesdropping, theft and fraud,
website intrusion, piracy of
software, unauthorized access,
social engineering issue, industrial
action, malwares, and denial of
service.
Since the threat is
done purposely
and intentionally
it had been ranked
1st
2nd According to Alcorn, Good
and Pain (2013), the
accidental threats would serve
the classification of the
operations gone wrong. The
accidental threats would be
developed without any
intention of harming the
information system in the
organization.
Some of the accidental threats of
the VIC information management
system implementation are failure
of outsourced operations, staff
errors, technical failures, loss of
information, transmission errors,
failure of communication, and
programming errors.
Since the threat is
done without any
motive or
intention, it has
been given ranked
2nd
Table 1: Comparison of Accidental and Deliberate Threats for VIC government
occurrence of operations. The low risk exposure areas are social engineering issues and errors
generated by the users.
3. Comparison and Ranking of Accidental and Deliberate Threats
Accidental and Deliberate threats for the VIC government information system
implementation is compared in the table below,
Rank Description Examples Justification of
ranking
1st The deliberate threats are
intentionally done activities
that had been done for
harming the operations of the
organization (Von Solms &
Van Niekerk, 2013).
The deliberate threats would
hinder the security and
privacy of the information in
VIC government.
Some of the deliberate threats of
the VIC information management
system implementation are
unauthorized software,
eavesdropping, theft and fraud,
website intrusion, piracy of
software, unauthorized access,
social engineering issue, industrial
action, malwares, and denial of
service.
Since the threat is
done purposely
and intentionally
it had been ranked
1st
2nd According to Alcorn, Good
and Pain (2013), the
accidental threats would serve
the classification of the
operations gone wrong. The
accidental threats would be
developed without any
intention of harming the
information system in the
organization.
Some of the accidental threats of
the VIC information management
system implementation are failure
of outsourced operations, staff
errors, technical failures, loss of
information, transmission errors,
failure of communication, and
programming errors.
Since the threat is
done without any
motive or
intention, it has
been given ranked
2nd
Table 1: Comparison of Accidental and Deliberate Threats for VIC government
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9RISK ASSESSMENT AND ANALYSIS
4. Security and Risk Management Challenges for VIC government
The implementation of the VIC government would have to face some risk and challenges
for the development of the information system in the VIC government. The security and risk
management challenges are,
Security Challenges: Rasmussen (2013) has pointed out that the implementation of the
information system would involve the development of the security challenges for VIC
government. The eavesdropping, theft and fraud, website intrusion, unauthorized access,
malwares, and denial of service are the major issues and security challenges for VIC
government.
Operational Challenges: The operational challenges of VIC government are resulted
when the information system implemented would not be able to accommodate the operations of
the organization (Rasmussen, 2013). The social engineering issue, industrial action, failure of
outsourced operations, loss of information, transmission errors, failure of communication, and
programming errors are the major issues and operational challenges for VIC government.
5. Comparing Risk and Uncertainty
Silbey (2013) defined risk as those factors that have a considerable impact of accelerating
or retarding the flow of operations in the organization. The threats can be consider as the factors
having immediate danger for the completion of the operations. The systematic flow of operations
in the information system would be halted due to the various processes of the operations. The
risks are the technical failures, unauthorized access, theft and fraud, transmission errors, and
malwares, and website intrusion.
4. Security and Risk Management Challenges for VIC government
The implementation of the VIC government would have to face some risk and challenges
for the development of the information system in the VIC government. The security and risk
management challenges are,
Security Challenges: Rasmussen (2013) has pointed out that the implementation of the
information system would involve the development of the security challenges for VIC
government. The eavesdropping, theft and fraud, website intrusion, unauthorized access,
malwares, and denial of service are the major issues and security challenges for VIC
government.
Operational Challenges: The operational challenges of VIC government are resulted
when the information system implemented would not be able to accommodate the operations of
the organization (Rasmussen, 2013). The social engineering issue, industrial action, failure of
outsourced operations, loss of information, transmission errors, failure of communication, and
programming errors are the major issues and operational challenges for VIC government.
5. Comparing Risk and Uncertainty
Silbey (2013) defined risk as those factors that have a considerable impact of accelerating
or retarding the flow of operations in the organization. The threats can be consider as the factors
having immediate danger for the completion of the operations. The systematic flow of operations
in the information system would be halted due to the various processes of the operations. The
risks are the technical failures, unauthorized access, theft and fraud, transmission errors, and
malwares, and website intrusion.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10RISK ASSESSMENT AND ANALYSIS
Covello et al. (2013) has explained uncertainty as the factor for the development of the
operations of the unpredictability and information processing. The VIC government would
involve the implementation of the effective and improved processes. However, the
unpredictability of operations would imply the effective and improved processing of VIC. The
uncertainties are the failure of outsourced operations, industrial action, and failure of
communication, social engineering issue, and transmission errors.
6. Risk Mitigation and Management
The risk mitigation and management would be helpful for the implementing the effective
and improved processing of the operations. The analysis of the risk mitigation and management
are,
Risk Identification: The identification of the risk factor would be implied for the
development of the effective and improved analysis of the risk factor. The identification of the
risk are evaluated for identifying the factors of risk in the operations.
Risk Analysis: The analysis of the risk would be implied for forming the development of
the risk and prioritizing them for the improvement of the operations. The analysis has formed the
development of the operations in risk identification.
Risk Mitigation: The mitigation of the risk can be done by forming the effective risk
mitigation strategies and implementing them for forming the effective deployment of the
operations. The implementation of the risk mitigation would involve the deployment of the
effective and smart processing of the operations.
Covello et al. (2013) has explained uncertainty as the factor for the development of the
operations of the unpredictability and information processing. The VIC government would
involve the implementation of the effective and improved processes. However, the
unpredictability of operations would imply the effective and improved processing of VIC. The
uncertainties are the failure of outsourced operations, industrial action, and failure of
communication, social engineering issue, and transmission errors.
6. Risk Mitigation and Management
The risk mitigation and management would be helpful for the implementing the effective
and improved processing of the operations. The analysis of the risk mitigation and management
are,
Risk Identification: The identification of the risk factor would be implied for the
development of the effective and improved analysis of the risk factor. The identification of the
risk are evaluated for identifying the factors of risk in the operations.
Risk Analysis: The analysis of the risk would be implied for forming the development of
the risk and prioritizing them for the improvement of the operations. The analysis has formed the
development of the operations in risk identification.
Risk Mitigation: The mitigation of the risk can be done by forming the effective risk
mitigation strategies and implementing them for forming the effective deployment of the
operations. The implementation of the risk mitigation would involve the deployment of the
effective and smart processing of the operations.

11RISK ASSESSMENT AND ANALYSIS
Risk Evaluation: The evaluation is used for forming the accurate and systematic and
improved processing of the operations. The evaluation would tend to form the development of
the effective and improved processing.
Conclusion
The integration of the information processing was largely responsible for the
development of operations in VIC Government and it could be achieved by developing the
effective risk management operations. The threats of implementing the information system at
VIC Government were failure of outsourced operations, staff errors, technical failures, industrial
action, theft and fraud, piracy of software, unauthorized software, unauthorized access, denial of
service, programming errors, loss of information, failure of communication, transmission errors,
website intrusion, malwares, eavesdropping, and social engineering issue. The risk assessments
had helped in integrating the development of the proper risk plan and its impact for the
systematic development of operations. The management of the operations formed the faster and
improved functions to implement the systematic and improved processing of the organization.
The risks caused the sluggish in the development of the operations and it would form hindrances
for carrying out the operations of the VIC government. The security threats or risk factors were
highly responsible for harming the flow of operations and resulting in direct or indirect harm to
the stakeholders. The implementation of the information system for VIC government consisted
of dividing the risk into high, medium, medium-low, and low risk exposure areas and analysing
them in terms of accidental and deliberate threat.
Risk Evaluation: The evaluation is used for forming the accurate and systematic and
improved processing of the operations. The evaluation would tend to form the development of
the effective and improved processing.
Conclusion
The integration of the information processing was largely responsible for the
development of operations in VIC Government and it could be achieved by developing the
effective risk management operations. The threats of implementing the information system at
VIC Government were failure of outsourced operations, staff errors, technical failures, industrial
action, theft and fraud, piracy of software, unauthorized software, unauthorized access, denial of
service, programming errors, loss of information, failure of communication, transmission errors,
website intrusion, malwares, eavesdropping, and social engineering issue. The risk assessments
had helped in integrating the development of the proper risk plan and its impact for the
systematic development of operations. The management of the operations formed the faster and
improved functions to implement the systematic and improved processing of the organization.
The risks caused the sluggish in the development of the operations and it would form hindrances
for carrying out the operations of the VIC government. The security threats or risk factors were
highly responsible for harming the flow of operations and resulting in direct or indirect harm to
the stakeholders. The implementation of the information system for VIC government consisted
of dividing the risk into high, medium, medium-low, and low risk exposure areas and analysing
them in terms of accidental and deliberate threat.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 14
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.