Preview

risk assessment

Powerful Essays
Open Document
Open Document
4141 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
risk assessment
5CI003 IT Risk Analysis

ASSIGNMENT Submission (Sem 1 – 2013-14)

Lastname : Mark

Firstname: Bash

Student Number: 1124409

Declaration :

I declare that this submission is my own work and has not been copied from someone else or commissioned to another to complete. Any materials used in this work (whether from published sources, the Internet or elsewhere) have been fully acknowledged and referenced and are without fabrication or falsification of data.
I have adhered to relevant ethical guidelines and procedures in the completion of this assignment. I have not allowed another student to have access to or copy from this work. The work has not been submitted previously.

By this declaration and by submitting this work, I confirm my understanding that –
The University may submit this work to the national plagiarism detection facility. This searches the Internet and an extensive database of reference material, including other students work and available essay sites., to identify any duplication with the work you have submitted. Once your work has been submitted to the detection service it will be stored electronically in a database and compared against work submitted from this and other universities. The material will be stored in this manner indefinitely.
Contents

1.0 Introduction

2.0 Risks to the Organisation and its IS/IT

3.0 Evaluation of risks

4.0 Countermeasures

5.0 Recommendation of measures to be taken to protect the business and priorities

6.0 References

Introduction

The company Trendmaster Limited is has been trading for 2 years from a converted barn, the business plan is to expand and move to a bigger premises that is 2 stories and significantly bigger. The new building is based near to a busy ring road in a large town, because of the business growing 4 additional staff have been hired in an attempt to continue with the



References: Doz, Y. (2001) From Global to Metanational: How companies win in the knowledge economy. Harvard Business Press Lewis, R. (2012) Business Income Insurance Disputes. Aspen Publishers Online Macdonald, L. (2008) How to Manage Problem Staff Successfully. Aspen Publishers Online Staightforward co Ltd Mana. (2012) Preventing Accidents Super Series. Routledge Shoniregun, C. (2006) Impacts and Risk Assessments of Technology for Internet Security. Springer Steinberg, T. (2006) Acts of God: The Unnatural History of Natural Disaster in America. Oxford University Press Waterman, I. (2013) Disabled access to facilities. Routledge

You May Also Find These Documents Helpful

  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    7. Communications and operations management: Incorporates operational procedures and responsibilities, third-party service delivery management, systems palnning and acceptance, protection against malicious and mobile code, backup, network security management, media handling, exchange of information, electronic commerce services and monitoring…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Powerful Essays

    P2 M2 D2 with front sheet

    • 1295 Words
    • 6 Pages

    I certify that the work submitted for this assignment is my own and research sources are fully acknowledged.…

    • 1295 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Btec It Level 2

    • 800 Words
    • 4 Pages

    I certify that the work submitted for this assignment is my own and research sources are fully acknowledged.…

    • 800 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Work submitted may be subjected to a plagiarism detection process. If this process is used, then copies of this work would be retained and used as source material for conducting future plagiarism checks.…

    • 7714 Words
    • 31 Pages
    Powerful Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    unit 4

    • 607 Words
    • 3 Pages

    I certify that the work submitted for this assignment is my own and research sources are fully acknowledged.…

    • 607 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The risk analysis of an IT asset for each vulnerability comprises of evaluating the dangers and remunerating controls to focus the probability that weakness could be abused and the potential effect ought to the helplessness be misused. For managing the risk impact of a potential threats and vulnerability is to be studied first. Taking into consideration the likelihood and vulnerability risk analysis is done. Risk is proportional to both likelihood of exploitation and possible impact. The discovering and related danger level was utilized to focus the proposals that ought to be connected as a means to alleviate the danger.…

    • 640 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Risk Assessment Paper

    • 907 Words
    • 3 Pages

    Leukemia is the malignant disorder of white blood cells in which the cells become abnormal and divide without control or order. Hematopoietic stem cells, also known as hemacytoblasts, are found in bone marrow and are the precursor to erythrocytes (red blood cells), leukocytes (white blood cells) and thrombocytes (platelets). Leukemia is caused by the mutation of the bone marrow pluripotent or most primitive hematopoietic stem cells (Caldwell, 2007). The mutations during hematopoiesis causes uncontrolled proliferation of stem cells resulting in overcrowding of bone marrow and decreased production and function of normal hematopoietic cells (Huether, 2012). The leukemic stem cells will then enter the blood stream affecting other organs such as the liver, spleen, lymphnodes, and under certain circumstances the central nervous system. The mutant clone may demonstrate unique morphologic, cytogenic, and immunophenotypic features that can be used to classify the particular type of leukemia (Caldwell, 2007). Leukemia can be fatal if left untreated because of the inhibited ability to produce and provide normal red blood cells, white blood cells, and plates to maintain homeostatic mechanisms.…

    • 907 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Assignment Brief

    • 1434 Words
    • 7 Pages

    I certify that the work submitted for this assignment is my own and research sources are fully acknowledged.…

    • 1434 Words
    • 7 Pages
    Good Essays
  • Good Essays

    2014 Cover Sheets

    • 696 Words
    • 3 Pages

    I understand that this assignment may undergo electronic detection for plagiarism, and a copy of the assignment may e retained on the database and used to make comparisons with other assignments in future.…

    • 696 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Assessing Risk

    • 781 Words
    • 4 Pages

    MY NAME What is it I want to do What are the benefits to me in doing this? What might go wrong? What might happen if I don’t do this? DATE…

    • 781 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    I certify that the work submitted for this assignment is my own and research sources are fully acknowledged.…

    • 1471 Words
    • 13 Pages
    Good Essays
  • Good Essays

    3.4 summarise the types of risks that may be involved in assessment in own area of responsibility.…

    • 868 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Risk Assessment Paper

    • 766 Words
    • 4 Pages

    The use of pesticides is an important decision that thousands of communities face each year. Nobody likes dealing with mosquitos and the diseases they bring so using chemicals and pesticides is an option but with other consequences. Mosquitos carry West Nile Virus that affects the city of Genericville every year with 50 cases projected this year in the city and two fatalities as well. On the other hand, the chemicals proposed for controlling the mosquito population has its own risks. The pesticide Malathion is also dangerous to people if they come in contact with it before it degrades. The potential for citizens of the city being exposed is almost a certainty with many short and long-term risks being unknown. In this risk assessment I will weigh the consequences of each approach being the use of Malathion on the mosquitos and wetlands or not and battle the mosquitos and West Nile Virus. This assessment will include Hazard identification, dose-response, exposure, and risk characterization.…

    • 766 Words
    • 4 Pages
    Good Essays