Preview

Week 10 Technical Paper

Powerful Essays
Open Document
Open Document
2283 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 10 Technical Paper
Every organization is faced with some risk or potential threat that could cause an interruption to the organization’s operations. These risks and threats can come from within or outside of the organization. To prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risks to protect the organization from the possible negative effects to the daily operations. Performing a risk assessment is one of the most important steps in the risk management process (eHow, 2011).

A Risk Assessment is periodic assessment of the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the organization. A risk assessment should include a consideration of the major factors in risk management: the value of the system or application, threats, vulnerabilities, and the effectiveness of current or proposed safeguards.

Many organizations perform risk assessments to measure the amount of risks that could affect their organization, and identify ways to minimize these risks before a major disaster occurs. Department of Defense Information Systems Agency (DISA) follows guidelines and policies governed by processes by which the organization assesses and manages exposure to risks. In this paper the subject to identify is the risks and potential effects associated with the areas of the organization pertaining to security, auditing, and disaster recovery.

Security is divided in three major areas: Physical security includes access to the building, offices, and the rooms housing the organization’s servers and other critical computing devices. External threats to the organization’s computing network such as hackers and malicious software. Access and permission to authorized users of the system as well as to the information.

Physical security of the DISA field office involves

You May Also Find These Documents Helpful

  • Good Essays

    Acct 504 Case Study 2

    • 1426 Words
    • 5 Pages

    Risk assessment – The organization must identify and analyze the different factors that generate risk for the business and must decide how to manage these risks. Because economic industry, regulatory and operating conditions will continue to change. (coso)…

    • 1426 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    RAR Template 07112007 3

    • 5647 Words
    • 25 Pages

    The <System Name> risk assessment was conducted in accordance with the methodology described in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-30, Risk Management Guide for Information Technology Systems. The methodology used to conduct this risk assessment is qualitative, and no attempt was made to determine any annual loss expectancies, asset…

    • 5647 Words
    • 25 Pages
    Powerful Essays
  • Satisfactory Essays

    ISSC363 Assignment 3

    • 586 Words
    • 2 Pages

    At its core, the purpose of a risk assessment is identifying and evaluating risks that may potentially have a negative impact on an organization. It can help management understand the impact in terms of costs to the organization or the severity of a loss depending on the methodology used to conduct the risk assessment. The goal is to provide sound recommendations based on the risk assessment to help maintain data confidentiality, integrity and vulnerability while ensuring functionality and usability. Based on the results, management can make more informed decisions about what resources to protect, how to protect them and understand the potential costs and impact. Once the purpose of the risk assessment is understood, defining the scope is next.…

    • 586 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    To reduce the impact of workplace risks in the Biz Ops corporation we need to look at any incidents or accidents that have occurred in the past, and assess whether the changes have been effective or if any changes need to be made to the current procedures. We also need to look at the current operating procedures and into future operations to update any changes we need to incorporate and set out a plan to put these procedures in place. All activities need to be assessed prior to making any changes and risk managed throughout with regular training, monitoring, auditing and reporting processes carried out. All employees are responsible for applying risk management principles and practices in their respective work areas…

    • 361 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Is 305 Lab 1

    • 538 Words
    • 3 Pages

    One of the most important first steps to risk management and implementing a risk mitigation strategy is to identify known risks, threats, and vulnerabilities and organize them. The purpose of the seven domains of a typical IT infrastructure is to help organize the roles, responsibilities, and accountabilities for risk management and risk mitigation. This lab requires students to identify risks, threats, and vulnerabilities and map them to the domain that these impact from a risk management perspective.…

    • 538 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    File11

    • 466 Words
    • 2 Pages

    appropriate to manage these risks. IT managers then present this information to senior management. The…

    • 466 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A risk assessment is nothing more than a careful examination of what, in your work, could cause harm to people, so that you can weigh up whether you have taken enough precautions or should do more to prevent harm.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete situation and a recognized threat, it is also called a hazard. Quantitative risk assessment requires calculations of two components of risk, the magnitude of the potential loss, and the probabilit that the loss will occur. Acceptable risk is a risk that is understood and tolerated usually because the cost or difficulty of implementing an effective countermeasure for the associated vulnerability exceeds the expectation of loss.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    miss

    • 371 Words
    • 2 Pages

    In practical terms, a risk assessment is a thorough look at your home , workplace , to identify those things, situations, processes, etc that may cause harm, particularly to people, staff and children. After identification is made, you evaluate how likely and severe the risk is, and then decide what measures should be in place to effectively prevent or control the harm from happening.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hello

    • 554 Words
    • 3 Pages

    |A risk assessment is a careful examination of what may cause harm within a certain area, once the risks and hazards are identified you |…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    health and safety unit 4

    • 749 Words
    • 3 Pages

    A risk assessment is something that helps to protect yourself and the people around you. It is a requirement in law to complete…

    • 749 Words
    • 3 Pages
    Good Essays
  • Good Essays

    again, a loss of personnel (some through illness, but most from fear of exposure) and a…

    • 876 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Security Manager Role

    • 1762 Words
    • 8 Pages

    Security takes into account all actions and objectives intended to meet asset safeguard goals to make certain that security problems do not occur. Management of security is defined as multifaceted and interdisciplinary. Security for an organization includes the use of criminal and civil law, inspections, sleuthing, profiling, business management, strategy proposals, psychology, sociology, and technology to shield persons and property. A security manager’s role varies, according to the organizational structure. A security manager takes on managerial, administrative, preventative, and investigative responsibilities and functions.…

    • 1762 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    business plan

    • 429 Words
    • 2 Pages

    This research paper is mainly subjected on issues how the organizations overcoming the risk management. It focuses specifically on need for security, security risk from outer environment and security threats through humans. The following issues are considered for recommending different kind of security strategies, coding and decoding the security , reducing about organization security issues, developing of advance security strategy frame work. These issues are the key roles for developing the advance security in organizations and make stepping stones for security management model.…

    • 429 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Improves the ability of existing incident response team etc. to defend a real time cyber-attack in future.…

    • 730 Words
    • 3 Pages
    Good Essays