Nobody downloaded yet

Security Risk Assessment - Coursework Example

Comments (0) Cite this document
Risk assessments are normally used for purposes of identifying any risks that business organization face, and this is in regard to their computer system (Calder and Watkins, 2010)…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful
Security Risk Assessment
Read TextPreview

Extract of sample "Security Risk Assessment"

Download file to see previous pages There are a variety of risks that a business organization faces when it comes to the implementation of a secure information technology system. This includes loss of information, an attack by internet or computer viruses and malwares, authorized use of data, etc (Vladimirov, Gavrilenko and Michajlowski, 2010). This paper analyzes the various elements that would make the computer system of a business organization to be vulnerable. It also examines the various measures aimed at protecting the computer system of a business organization.
A secure computer system must comprise of three major elements, namely recovery, resilience, and contingency (Calder and Watkins, 2010). Under resilience, the critical functions of a business organization and its supporting infrastructure are engineered and designed in a permanent manner. They are designed in a manner that it is impossible for any disruption to affect the functionality of these systems (Bradley and Carvey, 2006). It makes it likely for an organization to maintain its operations in case of a major threat or attack to its computer systems. For instance, a business organization may develop power back up systems, to protect the loss of data or their computer networks from going off, in circumstances where power fails to occur (Harrington, 2005). Business organizations may use solar gadgets and generators to protect their computer systems, in circumstances whereby power may fail.
Recovery involves restoring the important features of a computer system or network that failed to function (Bradley and Carvey, 2006). Computer experts may make arrangements aimed at recovering lost data, and making replacements on areas that is needed. This is to ensure that the activities of the business organization are not interrupted in any negative manner (Oppliger, 2000). Contingency involves ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Security Risk Assessment Coursework Example | Topics and Well Written Essays - 1500 words”, n.d.)
Security Risk Assessment Coursework Example | Topics and Well Written Essays - 1500 words. Retrieved from
(Security Risk Assessment Coursework Example | Topics and Well Written Essays - 1500 Words)
Security Risk Assessment Coursework Example | Topics and Well Written Essays - 1500 Words.
“Security Risk Assessment Coursework Example | Topics and Well Written Essays - 1500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security Risk Assessment

Network Security Risk Assessment

...? Network Security Risk Assessment Network Security Risk Assessment Introduction Advancement in technology has resulted to the development of innovative computing systems which have facilitated the functions of various organizations and institutions. The increasing complexity of information systems has resulted to information security threats which have infringed the right of individuals to privacy of information. This paper gives a critical analysis and discussion of Fast Distribution, Inc. with a view of investigating its information assets, organizational risk, security posture and...
9 Pages(2250 words)Term Paper

Information Security Risk Assessment Framework

...? Computer Sciences and Information Technology Annotated Bibliography Topic: Information Security Risk Assessment Framework and Metrics in the South Australia Real Estate Sector. Supervisor: Information Security Risk Assessment Framework and Metrics in the South Australia Real Estate Sector Australian Prudential Regulation Authority (2010) Prudential Practice Guide: PPG 234- Management of security risk in information and information technology. Web: Accessed on 10th April 2012. APRA records that Information Technology reporting and...
15 Pages(3750 words)Annotated Bibliography

Security Risk Assessment and Audit into the connection of the internal network with the Internet

...? Security Risk Assessment and Audit into the connection of the internal network with the Internet Security Risk Assessment and Audit into the connection of the internal network with the Internet 1.0 Implementation of an Information Security Program 1.1 Purpose of an Information Security Program An information security program is one of the fundamental aspects of security management that must be properly implemented to ensure that information within the computer systems are appropriately protected (Krause & Tipton, 2007). Threats to information systems include...
18 Pages(4500 words)Essay

Computer Security Information Risk Assessment & Security Management

...First Assignment. In today's world Computers are used to store and process a variety of confidential information like financial data, records of criminals and the crimes committed by them, medical history of patients, social security data, a company's personnel and payroll data, inventory and sales data, weather data, troops deployment data, missile deployment data, satellite surveillance obtained topographical data, etc. This data is considered confidential because access to the Computer and its data is supposed to be restricted to a limited number of users. This confidentiality can be compromised in a variety of ways. For example, integrity and confidentiality of computers and their data can be compromised by computer...
4 Pages(1000 words)Essay

Information security risk assessment and mitigation strategies development

...Information security risk assessment and mitigation strategies development The importance of information technology cannot be denied nowadays. This proposal concerns the study of information security risk assessment and mitigation strategies development. The suggested risk assessment strategy is proposed as a universal paradigm of potential risk occurrence measurement and is positioned as a universal principle relevant to any organization. Introduction Currently, information technologies play a crucial role in the life and activities of any organization. Every company in the modern...
5 Pages(1250 words)Thesis Proposal

Physical security and risk assessment of the alfred p.murrah building

...Physical Security and Risk Assessment of the Alfred P.Murrah Building al Affiliation Vulnerability Assessment Alfred federal building was put in the spotlight when after a blast attack four of its columns were severely destroyed resulting in the death and injury of many. One of the columns, G20 was reportedly shattered due to its proximity to the truck bomb whilst the other two, G16 and G24 had there major supporting angle weakened as stated by Dusenberry (2010). Due to this the upper floor had no support from the ones below resulting to there subsequent collapse. In as much as this tragedy led to several theories speculating as to what could have led to the failure of such a strong steel building, one uniform conclusion drawn... was put to...
3 Pages(750 words)Term Paper

Physical Security risk Assessment

...PHYSICAL SECURITY RISK ASSESSMENT PHYSICAL SECURITY RISK ASSESSMENT The hardening requirements for BC Place Stadium Hardening in the most basic language is the reinforcing and thickening of building materials to resist physical attacks like breaking in and cutting it. There are two specific types of hardening that act as the final line of resistance against intrusion, these are; antiballistic hardening and forced entry resistance (National Institute of Building Sciences, 2012). Consequently, hardening also significantly describes the efforts made to make regular entry and access of build structures more channeled and resistant. Hardening is an expensive but worth course, the lives and safety of people is always at stake especially... ...
6 Pages(1500 words)Coursework

Security Risk Assessment

...Lecturer number Security Risk Assessment EXECUTIVE SUMMARY Implementing an IT security risk assessment is absolutely critical to the overall security posture of any organization. An effective security risk assessment can prevent breaches, reduce impact created by the realized breaches, and keep the companys name from appearing in the spotlight for all the wrong reasons. It is also a fact that regular IT security risk assessments will also enable organizations to build up a cache of historical data that can be used to...
7 Pages(1750 words)Term Paper

Risk Assessment for Effective Physical Security

...Risk Assessment for Effective Physical Security and Introduction Physical security threats are a significant threat for all organizations. Physical security is especially important for organizations that have an information technology system that stores the organization’s sensitive data.1 As the information experts continuously design ways to counter data breaches, intruders increasingly find it hard to access data through technical means. These criminals have now turned to physical infiltration and intrusion to gain access to privileged facilities and data that they are not authorized to. Physical intrusion is, however, not treated with the same...
6 Pages(1500 words)Term Paper

Risk Assessment and Security Controls

...Risk Assessment and Security Controls The business with its system located in an unsecured room has two vulnerabilities. First is the physical vulnerability and it would be safe to assume that the business owner did not take precautionary measure to protect his network and system from malicious intrusion. To protect the network and system, the business owner must institute the following security measures 1. Physical security – put in physical security such as lock and key security because the system is in unlocked room within the main building of the business. In addition, level of access must be scrutinized with only authorized personnel having physical access to the server. 2. Control the use of administrative privileges... , detect and...
1 Pages(250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Security Risk Assessment for FREE!

Contact Us