StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Overview of IS Risk Assessment (IP) - Research Paper Example

Cite this document
Summary
Full Paper Title Name University Why Risk Assessment is Essential? The risk is defined as the likelihood of different threats via different circumstances, which are affecting the network and information systems. The circumstances should consider the strategy, security measures, environmental measures, own experience and the experience of other connected entities in the context of information security failure…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Overview of IS Risk Assessment (IP)
Read Text Preview

Extract of sample "Overview of IS Risk Assessment (IP)"

Download file to see previous pages

Measurements consist of (Sun, Srivastava, & Mock, 2006): Cost which is used to protect the information and systems Value of the information and information systems Threat probability and occurrence Effectiveness of Controls Prior to Risk Assessment Before conducting risk assessment, primary factors are considered. The identification of information assets lays the foundation for further assessment. Information assets are defined as the entities that hold organization data. A good discussion is available on ‘www.ibm.com’ which states it as, information assets precisely resembles with the nature of business and business strategy of the organization.

Likewise, these information systems may be subjected to contractual and legislative compliance requiring protection from threats and mission critical systems. The information assets for an organization will be the technology assets, data asset, service asset and people asset. In a typical scenario of an organization’s network, the owners for server hardware will be the server administration group. The owners for the applications running on the servers will be the application support group and the owners for the data, which is stored on the server, will be system development group.

Question needs to be answered Moreover, the risk management process involves the implementation of safeguards and controls that are continuously observed. Likewise, risk management identifies information assets along with their weaknesses and prioritizes them as per severity and business impact. The self-examination process of risk management assists managers to identify and mark severity of information assets. However, it is not a fact that assets are only indicating as systems, they also includes people, hardware and software components.

Moreover, risk management also reflects asset classification, categorization of groups with respect to business impact against each identified asset; there are certain questions that need to be answered: What is the most important or mission critical asset for the organization? Which asset generates profit for the organization? Which asset provides revenue for the organization? Which information asset has the most replacement cost? Which information asset requires significant protection cost?

Which information asset reflects the most significant liability when breached? Phases of Risk Assessment The first phase of risk assessment is the investigation phase. The investigation phase is conducted to gather information regarding the system and resources. The threats are prioritized before assessment. The identification of critical components is conducted in order to prioritize threats. After prioritization, related plug-in is selected before execution. Risk assessment includes the scanning of all open ports of the system.

This phase also conducts scanning of all known vulnerabilities. The next phase includes reporting of the findings which are extracted by investigation phase. The findings are then categorized in different priorities. The report illustrates open ports, number of vulnerabilities found at high status, number of vulnerabilities found at medium status, number of vulnerabilities found at low status (Fenz, Ekelhart, & Neubauer, 2011). Report also includes host information including the ‘netbios’ name, DNS name and operating system. This phas

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Overview of IS Risk Assessment (IP) Research Paper”, n.d.)
Overview of IS Risk Assessment (IP) Research Paper. Retrieved from https://studentshare.org/information-technology/1457868-overview-of-is-risk-assessment-ip
(Overview of IS Risk Assessment (IP) Research Paper)
Overview of IS Risk Assessment (IP) Research Paper. https://studentshare.org/information-technology/1457868-overview-of-is-risk-assessment-ip.
“Overview of IS Risk Assessment (IP) Research Paper”, n.d. https://studentshare.org/information-technology/1457868-overview-of-is-risk-assessment-ip.
  • Cited: 0 times

CHECK THESE SAMPLES OF Overview of IS Risk Assessment (IP)

Nursing Interventions to Prevent Falls in the Elderly

Placement – CityofWhitehorse, Melbourne, Australia Participant Age– 70 years and above (residing at own homes) Data assessment– The researchers compared and divided individuals into different groups according to the available data on the basis of higher percentage: Sample size–On the basis of 25%annualfall-reductionconsidered to be an achievable target the studies required 914 participants and 1143 participants for a non-intervention assessment and main effect comparison(annual fall-rateof 35 per 100 individuals) allowing a 20% dropout....
7 Pages (1750 words) Research Paper

Risk management

Before applying the risk management practices; risk assessment should be done in order to know that what can go wrong at a definite time period and what the outcome will be if it does.... This paper will focus on the methodology and structure, purposes of risk management, application of risk management in oil exploration programs, identification of spillage risks, risk assessment of oil spillage risks, risk response planning for oil spillage risks and risk monitoring and control for oil spillage risks....
26 Pages (6500 words) Literature review

A Framework for the Management of Oil Spillage Risks in Oil Exploration Programmes

This paper will focus on the methodology and structure, purposes of risk management, application of risk management in oil exploration programs, identification of spillage risks, risk assessment of oil spillage risks, risk response planning for oil spillage risks and risk monitoring.... hellip; this paper is concerned with the management of oil spills and oil spillage risk in oil exploration programs.... nbsp;The objectives will be to investigate the nature of oil spillage risks; identify and summarize the existing understanding about oil spillage risk management; discover good practices in managing oil spillage risks and to provide a new framework that summarizes the findings and can be used further for managing oil spillage risks....
67 Pages (16750 words) Dissertation

Operation Management: Literature Review/Critique

The findings indicated that OSCM with more expertise ignored less information and specialized expertise used increased certainty in the assessment process whereas general expertise made high intuitive judgment.... The article of operational risk assessments by supply chain professionals: process and performance is one of the significant articles that attempts to examine the way many operation and supply chain managers have made significant efforts to increase competition, as well as, meet the demanding needs of customers through the paradox of efficiency process performance....
6 Pages (1500 words) Essay

Amazon - Risk Assessment

The study "Amazon - risk assessment" provides a comprehensive idea about the concept of risk assessment faced by an organization while performing distinct operational or business functions,  the ways by which a proper understanding of the risks associated with Amazon can be made.... In this regard, risk assessment is referred to as the process, which involves identification of the business risks, evaluation of those risks and formulation of corrective measures to cope with the same (Drissi, Houman & Medromi, 2013)....
15 Pages (3750 words) Case Study

Risk Assessment

This paper ''risk assessment'' discusses that risk assessment based on GFI network diagram.... nbsp;risk assessment will be conducted ion GFI network to establish the likely areas of failure.... n this study, I am going to undertake risk assessment based on GFI network diagram.... risk assessment will focus on managerial, operational and technical aspects that are prone to vulnerabilities and which can be exploited by attackers....
11 Pages (2750 words) Term Paper

Process Safety Risk Assessment System

Petroleum products are hazardous and require proper process risk assessment (Pitblado 1995).... This review is based on three segments with the first part concerns the introduction of key terms that are essential in process safety assessment system (Kletz 1999; Gustafson 2006).... This paper provides a general idea of the psychometric and cultural strategies underpinning risk perception, providing an insight into the causes why risks are understood in different ways....
24 Pages (6000 words) Coursework

Enterprise Application SystemsIntegration- Assessment Documentation

It is the intent of this paper ''Enterprise Application SystemsIntegration- assessment Documentation'' to align the business and system requirements that get articulated during the Enterprise Application Service Integration (EASI) design process with business requirements for availability, performance and manageability....
26 Pages (6500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us