StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Computer security and risk management - Essay Example

Cite this document
Summary
Abstract: Businesses are getting increasingly complex in the modern era that is driven by faster dynamics and rapid changes as compared to the previous decades. The dynamism also includes faster emergence of threats over and above the already known threats. In order to protect…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Computer security and risk management
Read Text Preview

Extract of sample "Computer security and risk management"

Download file to see previous pages

This paper presents a Risk Management methodology for multi-national pharmaceutical company in Midlands pertaining to protection of the Information assets and the corresponding business assets of the organization against the known threats to the organization. Introduction: Risk Management is an intelligent mix of qualitative and quantitative analysis. The qualitative analysis procedure essentially requires establishment of a structured and logical assessment framework whereby metrics are assigned to every parameter that is being assessed.

The analysis against the metric levels needs to be quantitative based on past experiences (data available), industry experiences (case studies), advice from consultants and internal brainstorming. Every level needs proper justification to a deep level such that serious risks do not remain un-noticed and also meager risks do not get projected to the management as serious simply because they are more talked about in the organization. In this paper a systematic Risk Management procedure is being presented in detail and applied to the case study.

The workflow of risk management has been arrived at after a study of National Institute of Standards and Technology), BS ISO/IEC 27001:2005 standard and ISO/IEC 17799:2005 code of best practices. These approaches recommend that the asset values are calculated based on Confidentiality (C), Integrity (I) and Availability (A). Thereafter, the comprehensive list of threats to the business are listed down such that the overall threat value, probability value, vulnerability value and risk value can be calculated for each asset (Olzak, Tom, 2008).

Risk Assessment Process: The Risk Management Process proposed in this case study has been presented in the figure below (Figure 1). This methodology requires that all the assets are first collated and their characterization is done in terms

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer security and risk management Essay Example | Topics and Well Written Essays - 2750 words”, n.d.)
Computer security and risk management Essay Example | Topics and Well Written Essays - 2750 words. Retrieved from https://studentshare.org/miscellaneous/1549327-computer-security-and-risk-management
(Computer Security and Risk Management Essay Example | Topics and Well Written Essays - 2750 Words)
Computer Security and Risk Management Essay Example | Topics and Well Written Essays - 2750 Words. https://studentshare.org/miscellaneous/1549327-computer-security-and-risk-management.
“Computer Security and Risk Management Essay Example | Topics and Well Written Essays - 2750 Words”, n.d. https://studentshare.org/miscellaneous/1549327-computer-security-and-risk-management.
  • Cited: 1 times

CHECK THESE SAMPLES OF Computer security and risk management

Computer Security and the Systems Vulnerabilities

The recommendations encompass the development of multifactor authentication, a risk management system, introducing firewalls etc.... Assessment Title: computer security Customer name Program Matriculation number Word Count: 1526 words Contents Abstract 3 Introduction 4 Identifying Threats and Vulnerabilities 4 Examination of the Security Principles Broken 4 Recommendations 5 References 7 Abstract computer security refers to the minimization of vulnerabilities to assets and resources....
6 Pages (1500 words) Essay

Global Internet Security

Global internet security is a concern for all the world be because of teethe intermeddle have gained many benefits, there are also many disadvantages such as internet fraud, loss of security and privacy, virus attackman, threats to data protection and computer misuse.... Internalized the gaps between people and their wanted works but it has also given us many disadvantages such as security rethreads computers that are kept and used in global settings are at threat in terms of security and if they are accessed illegally, there will be security threat and the private data of the companies or organizations that are working on international basis can get lost....
19 Pages (4750 words) Essay

Computer Security Information Risk Assessment & Security Management

In today's world Computers are used to store and process a variety of confidential information like financial data, records of criminals and the crimes committed by them, medical history of patients, social security data, a company's personnel and payroll data, inventory and sales data, weather data, troops deployment data, missile deployment data, satellite surveillance obtained topographical data, etc.... Nowadays, almost every person having a vehicle loan, a housing loan, a credit or debit card, and automated teller machine card, a social security number, a passport, a driving license, a telephone connection, etc, has to provide detailed personal information to the agency or authority, which provides that particular facility or service....
4 Pages (1000 words) Essay

Information Security Managment

The group that surveyed the security and trustworthiness of the association and made recommendations included: This step helps in identifying the vulnerabilities that relate to the operation of Tesco UK supermarket.... This risk appraisal returns from the prior research that was carried out by the administration.... Just like in every risk appraisal, there has to be a team that would undertake the various roles in order to meet the desired goal or the exercise3....
20 Pages (5000 words) Essay

Identifying Threats and Vulnerabilities to Computer

The recommendations encompass the development of multifactor authentication, a risk management system, introducing firewalls, etc.... When securing data, the link between security and accessibility comes into limelight.... The study "computer security" concerns an example of how security lapses can occur and expose the system's vulnerabilities.... Security encompasses the elements of keeping information confidential and of upholding the integrity and availability of resources; these three elements are often used to describe computer security goals (Stallings 2009)....
6 Pages (1500 words) Report

Computer Security

The paper gives detailed information about the computer security.... This paper presents a detailed overview of computer security.... This paper discusses how computer security has become an important issue for the companies.... In view of the fact that the word computer security is employed regularly; however, the framework of a computer system is defenseless to a number of threats except the system is linked with more computer systems using some sort of network arrangement....
9 Pages (2250 words) Research Paper

Amazons Elastic Compute Cloud Service

hellip; High security and privacy are necessary to earn customers' trust for the online products offered, especially with increased incidences of cybercrimes and related consequences.... To achieve this, the paper will describe the EC2 service and issues related to innovations and design such as software vulnerabilities, privacy risks, and security threats.... Users run the machine by selecting resource configurations, login in the form of specified credentials, a security group, and data center regions where the machine runs....
8 Pages (2000 words) Case Study

The Strategies Applied in Computer Security

Some of the main objectives for the application of computer security in any Information Technology based environment include safeguarding information and the available properties free from theft cases, natural disasters corruption.... The strategies or methodologies applied in computer security usually differ from the rest of computer technologies since it involves the prevention of unethical computer behavior, rather than just enabling the required computer behaviors (Layton 119)....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us