Retrieved from https://studentshare.org/information-technology/1628798-information-security
https://studentshare.org/information-technology/1628798-information-security.
Windrush ventures should see whether the cloud vendor has implemented necessary security initiatives and whether it is adhering to the provisions of the Data Protection Act. Risk Assessment: Severity Score (out of 10): 9 Likelihood Score (out of 10): 6 Risk Index (Severity x Likelihood): 54 Safeguarding Strategy: Detection: There always exists the threat of the breach of data. Windrush ventures should have an adequate risk identification process so that it can minimize revenue losses, loss in productivity and time and the negative impact on customers can be minimized.
For deduction of risk, Windrush Ventures may use fault tree analysis, which is a well-known risk analysis method to recognize risk scenarios in a reference process model for logistics. Avoidance: Windrush should also look into the data encryption facility offered by Oracle as a safeguarding strategy for its valuable data stored with them. Protection: Windrush Ventures should assess how far Oracle SQL Server offers data security solutions and how Oracle supports their platform, what are all the data protection elements are available and how the Oracle comprehends best practice.
Recovery: Windrush should use Oracle “ Data Recovery Advisor “ for recovering the corrupted data, if any, that may happen in the near future.
Read More