Download file to see previous pages...
Large organizations tend to spend great number of resources on implementing security measures to keep their informational assets safe but the writer states that there is not much awareness about this aspect in the non-profit organizations that have very limited resources and IT budgets.
The author of the chosen paper, Fox (2008) understands the constraint of limited budgets in non-profit organizations therefore devised the methodology that would not cause them any setbacks in their financial system. The following aspects are considered for the development of the respective methodology; inexpensive or free software components that are compatible with Microsoft, no new infrastructure risk is brought about in the system, tools must be simple enough to be operable by volunteers after only few training sessions.
The methodology that has been proposed by the author involves a series of steps that should be followed to ensure that the non-profit organization understands the risks that might be present in their IT infrastructure. Fox (2008) proposed the following steps:
The series of steps for the risk assessment process is detailed and covers some of the basic considerations that should be involved in the conventional mode of risk assessment for example; the views of the top management regarding the important data that should be safeguarded and the authorities who should have access to the data. However, the implementation of the methodology requires the assessor to be equipped with the knowledge of UML which might pose to be a challenge for the volunteers in the non-profit organization. It requires considerable training to possess the skill of framing real life instances into UML framework.
Another aspect of the paper that could have been explained in a better manner involves COBIT and NIST 800-30 security standards. The methodology is claimed to be based on these security standards but the
...Download file to see next pagesRead More
As the paper is all about risk assessment hence understanding of this concept is foremost requirement. Risk assessment is part of risk management in which level of risk in a particular event or place is calculated. It can be quantitative and qualitative. There are calculations in quantitative risk assessment which includes magnitude of risk and probability of occurrence of the risk event.
In a situation involving terrorism, the threat is the individuals or groups of people that are present. They have the ability and a past of expressing purpose for using actions that are perceived as hostile. Sometimes, they use actual procedures that are hostile against potential targets.
Risk for individual occurrence is measured as a function of relevant statistics and data pulled from child advocacy studies and current media. The resulting data shows that privacy concerns are the most likely to occur with cyber bullying, identity theft, and sexual exploitation rounding out the list.
A risk is also the possibility that less than expected returns will always be experienced most so in business ventures. Risks include:- financial risk, credit risks, inflation risk, economic risks, mortgage risks, exchange rates risk, interest rates risks, prepayment risk, opportunity risk and also unsystematic risks.
This essay attempts to analyse the processes of project risk management and gives an insight to the development of strategies to overcome the risk factor with the help of data regarding anticipated risk and the assessment of its probabilities. The adoption of strategies to regulate the potential risk will determine the overall impact and its consequences in terms of money and time.
Risk perception also includes the cognitive and affective responses to such hazards and is developed in each person by his past experiences, his knowledge, beliefs, values and the mandates of legitimate authorities such as parental, governmental, educational and institutional (i.e.
rvices, processes and production operation; subcontracting and purchasing activities; off site processes including delivery, installation and servicing; change management (product or process introduction and modifications); legal obligation compliance; and risk quantification
According to Spoolman & Miller (2011), a risk is the probability of suffering harm from a hazard that can cause injury, disease, death, economic loss or damage and is usually expressed as a mathematical
2 Pages(500 words)Essay
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic Risk Assessment for FREE!