This website uses cookies to ensure you have the best experience. Learn more

Risk Assessment In Information Technology Essay

3280 words - 14 pages

Risk Assessment in Information Technology

Risk Assessment in Information Technology
This paper will address risk assessment in Information Technology and discuss factors used to identify all kinds of risks in company network diagram. It will also assess the risk factors that are inclusive for the Company and give the assumptions related to the security data as well as regulatory issues surrounding risk assessment. In addressing the global implications, the paper will propose network security vulnerabilities and recommend the mitigation measures for the vulnerabilities. Cryptography recommendations based on data driven decision-making will be assessed, and develop risk assessment ...view middle of the document...

* Step 4 – resources and references to assess and test security controls. Threats and vulnerabilities create risks to activate the security conditions and controls for system design.
* Step 5 – the Body of Evidence to achieve authorization (accreditation). An “approving official” (AO) must review all documented risks to determine acceptable risks.
* Step 6 considerations for continuous monitoring. All weaknesses and problems will undergo review through an information security continuous monitoring (ISCM) program.
These steps provides a detailed walk-through of National Institute of Standards and Technology (NIST) Special Publication (SP) 800-30, 37, 39 and 53/53A; FIPS 199 and the Committee for National Security Systems (CNSS) Instruction 1253 (National Institute of Standards and Technology, 2014). Because most security professionals still encounter Director of Central Intelligence (DCID) 6/3 in the workplace as organizations gradually transition to ICD 503, this course provides a high-level overview of the DCID and highlights the most distinct differences between it and ICD 503.
There are various company risk assessment vulnerabilities in technical security, operational and management, Operational and Technical Security. Vulnerabilities or risks are weaknesses that may be used by a single or group of threats. Vulnerabilities can be alleviated by recommended protection methods (Investopedia 2014). Protections or safeguards are security controls and features that, when included or added in the information technology setting, can prevent the risks associated with the management operations.
The primary intention of a risk assessment in Information Technology is to assess the sufficiency of the company network and security. Risk assessment offers a prearranged quantitative and qualitative evaluation of the operational surrounding. It addresses vulnerabilities, threats, safeguards, risks and sensitivity. Risk assessment provides recommendations on cost-effective safeguards to alleviate exploitable vulnerabilities and associated threats (Kim & Gregg, 2005).
Every Information Technology risk assessment has a defined scope in any particular company. Risk assessment in Information Technology evaluates planned or implemented system’s use of controls and resources to manage and/or eliminate vulnerabilities utilizable by threats of both external and internal of the company. Risk Assessment account assesses the privacy (security from illegal exposure of data and system information), honesty (guard from improper alteration of information), and accessibility (loss of system access) of the system (Harris).
Authentication technology and network security issues
Network server of Information Technology companies allow administrators to easily examine network failures by scanning, and to check the company network to identify the failures and can also fix sudden conditions before the company’s user’s informs the manager. When threats...

Other Papers Like Risk Assessment in Information Technology

Investigation and Research of Information Technology in the Workplace

2981 words - 12 pages Advantages of the Technology 5.1.1 Enhancements in Communication 5.1.2 Reduction in Costs 5.1.3 Creating New and Exciting Jobs 5.2 Drawbacks of this Technology 6.0 Impact of Management Information Systems Technology on Avtovaz 7.0 Functionality of the Technology 8.0 Similarities and Differences with Other Technologies 9.0 Conclusion 10.0 Reference Abstract In this report, the objective is

The Use of Health Information Technology in Healthcare

3509 words - 15 pages ………………………………………………………….5 LITERATURE REVIEW…………………………………………………………………………………………………………..6 WHAT IS HEALTH INFORMATION TECHNOLOGY……………………………………………………...6-8 INFORMATICS IN HEALTHCARE……………………………………………………………………………….8-9 BENEFITS OF INFORMATICS……………………………………………………………………………………9-10 PROBLEM ANALYSIS…………………………………………………………………………………………………………..10 THE COST OF HEALTH IT………………………………………………………………………………………10-11 HOW IT IMPROVED QUALITY

Technology In Criminal Justice: Information And Dispatch Systems

762 words - 4 pages Advances in criminal justice technology can help police to be able to respond faster to help control crime, maintain order, and responding to emergency 911 calls by regulating the flow of traffic on radio systems. By the use of technology, it can enhance the police agencies, fire departments, and ambulance services response time. When the response time is faster, the public safety and well-being is being met.Interoperability is important to law

The Information Flows and Supporting Technology in the Automotive Supply Chain: a Suppliers Focus”

2135 words - 9 pages information technology, to minimize the risk of losing the business. The consolidation into larger first-tier suppliers has been one of the results and one of the initiators of new supply chain partnering. REFERENCES: 1. Childerhouse, P., Hermiz, R., et al. Information flow in automotive supply chains – present industrial practice. Industrial Management & Data Systems 103, 3 (2003), 137-149. 2. Collins, R., Bechler, K., et al. Outsourcing in the

The Impact of Information Technology on the Accountancy Profession in Nigeria

2905 words - 12 pages THE IMPACT OF INFORMATION TECHNOLOGY ON THE ACCOUNTING PROFESSION IN NIGERIA By: Idongesit Efiong Utah ABSTRACT This research focuses on assessing the impact of information technology on the Nigerian Accounting profession by examining four areas: Impact on the public and private sector, the challenges and reaction to the challenges posed by information technological innovation and information technologies enhancing effect on the Accounting

Can Brazil Become a Global Competitor in the Information Technology Outsourcing Business?

628 words - 3 pages Minicase: Can Brazil Become a Global Competitor in the Information Technology Outsourcing Business? 1. Use the theories of international trade and investment that have been presented in this chapter to help explain Brazil’s intentions and actions regarding the international information technology sector. The IT Service industry has expanded rapidly. Many companies worldwide have made the decision to outsource this industry to offshore

How and for What Purposes Do Companies Use Information Technology in Supply Chain Management?”

1265 words - 6 pages Abstract In order to survive and beat the competition in today’s competitive world, one has to manage the future. Managing the future means managing information. In order to deliver quality information to the decision-maker at the right time and in order to automate the process of data collection, collation and refinement, organizations have to make Information Technology an ally, harness its full potential and use it in the best possible way

Foundations in Information Technology Unit 2 Assignment

1464 words - 6 pages ergonomic work environment • Understand ethical choices of individuals in computing Course Outcomes practiced in this unit: IT190-2: Describe the basic components of a computer network Do not forget, whenever you look up information, you need to cite your sources! Please copy and paste the full URL of any website you use in researching your answers to the following questions. If you use your book, please place the page number from

E Governance

564 words - 3 pages investment and achieve significant business improvement. Security AssessmentAs part of the Infrastructure Assessment Framework, Quadra also offers you a unique, customized Risk Assessment, based on the Microsoft Security Assessment Toolkit, designed to provide information and recommendations about best practices for security within an information technology (IT) infrastructure. This helps you to assess weaknesses in your current IT security environments, and also to identify processes, resources, and technologies that are designed to promote good security planning and risk mitigation practices within your organization.

It Risk Management

1301 words - 6 pages Information Technology Risk Management Risk management is the continuing method to recognize, examine, appraise, and treat loss exposures and monitor risk control and financial resources to diminish the adverse effects of loss (Marquette). Every company has a goal. In this internet age, as companies use computerized information technology systems to manage their data for better support of their goals, risk management plays a crucial role in

Information Technology

1710 words - 7 pages Cooper, D. F., Grey, S., Raymond, G., & Walker, P. (2005). Project risk management guidelines: Managing risk in large projects and complex procurements. Hoboken, NJ: Wiley. Greenstein, M., & Vasarhelyi, M. (2002). Electronic commerce: Security, risk management, and control (2nd ed.). Boston, MA: McGraw-Hill. Marchewka, J. T. (2009). Information technology project management: Providing measurable organizational value (3rd ed.). Hoboken, NJ: Wiley

Related Essays

Managing Risk In Information Systems Chapter 4 Key Terms / Assessment

875 words - 4 pages Ryan Spikes Contingency Planning Ch4 Key Concepts and Chapter Assessment Affinity diagram - A diagram consisting of 4 steps, identify the problem , generate ideas, gather ideas into related groups, create the affinity diagram. Refer to page 142 for an example. Brainstorming - In a brainstorming session all participants spout out ideas which are written down without judgement. Cause and effect diagram - Also known as Ishikawa diagram or

Diploma In Information Technology Essay

965 words - 4 pages BTEC L3 Diploma in Information Technology (QCF) | Student | | | Tutor | | Assignment | 2 | Course unit | Unit 1 – Communication and Employability Skills for IT | Title | Communication and Interpersonal Skills | Date Set: | | Date Due: | | Receiving Date: | | Assignment verification | Internal verification | Originator: | | Assessor: | | I.V Approval: | | Grade: | Grading

Going Green In Information Technology Industry

872 words - 4 pages concept is new and upcoming, it fits in perfectly with the strategy of the partnership, and it all starts with some basic changes that will go a long way. With so many computers and a building in the downtown area, cost is a factor. Finding a way to utilize the technology optimization and collecting information on employees locking their computers or laptops, versus putting them to sleep could be a step in the right direction. Besides this, the racks

Risk Assessment With Relation To Falls In The Home In The Elderly Population

2125 words - 9 pages treatments and make a more speedy recovery. However, individual patients having differing information requirements need truly skilful interaction, which requires adaptive flexibility in reaching join goals (Dickson 2001). The district nurse, assessing our client had to take into account she was a guest in Mrs Pugh's home. There was an assessment, of the risk of further falls, to make the environment safer, but these goals had