Preview

risk assessment

Powerful Essays
Open Document
Open Document
4141 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
risk assessment
5CI003 IT Risk Analysis

ASSIGNMENT Submission (Sem 1 – 2013-14)

Lastname : Mark

Firstname: Bash

Student Number: 1124409

Declaration :

I declare that this submission is my own work and has not been copied from someone else or commissioned to another to complete. Any materials used in this work (whether from published sources, the Internet or elsewhere) have been fully acknowledged and referenced and are without fabrication or falsification of data.
I have adhered to relevant ethical guidelines and procedures in the completion of this assignment. I have not allowed another student to have access to or copy from this work. The work has not been submitted previously.

By this declaration and by submitting this work, I confirm my understanding that –
The University may submit this work to the national plagiarism detection facility. This searches the Internet and an extensive database of reference material, including other students work and available essay sites., to identify any duplication with the work you have submitted. Once your work has been submitted to the detection service it will be stored electronically in a database and compared against work submitted from this and other universities. The material will be stored in this manner indefinitely.
Contents

1.0 Introduction

2.0 Risks to the Organisation and its IS/IT

3.0 Evaluation of risks

4.0 Countermeasures

5.0 Recommendation of measures to be taken to protect the business and priorities

6.0 References

Introduction

The company Trendmaster Limited is has been trading for 2 years from a converted barn, the business plan is to expand and move to a bigger premises that is 2 stories and significantly bigger. The new building is based near to a busy ring road in a large town, because of the business growing 4 additional staff have been hired in an attempt to continue with the



References: Doz, Y. (2001) From Global to Metanational: How companies win in the knowledge economy. Harvard Business Press Lewis, R. (2012) Business Income Insurance Disputes. Aspen Publishers Online Macdonald, L. (2008) How to Manage Problem Staff Successfully. Aspen Publishers Online Staightforward co Ltd Mana. (2012) Preventing Accidents Super Series. Routledge Shoniregun, C. (2006) Impacts and Risk Assessments of Technology for Internet Security. Springer Steinberg, T. (2006) Acts of God: The Unnatural History of Natural Disaster in America. Oxford University Press Waterman, I. (2013) Disabled access to facilities. Routledge

You May Also Find These Documents Helpful

  • Good Essays

    3.4 summarise the types of risks that may be involved in assessment in own area of responsibility.…

    • 868 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Risk Assessment

    • 2166 Words
    • 9 Pages

    I believe without the will to take risk a person would possibly lead an unfulfilling life. We as individuals take risks every day in most every thing we do. We learn from risk taking the possible dangers and how as an individual, decide how we will manage our lives. However those of us who have the capacity to take a risk accept the consequences. I therefore believe those of us who are at a greater risk of harm due to having less capacity to understand the risk to themselves and others, would need support in understanding the risks they take.…

    • 2166 Words
    • 9 Pages
    Good Essays
  • Good Essays

    It is important you have a balanced approach towards risk assessments. You must always make sure that children are not at any risk but sometimes you may give them the freedom to do something knowing they won’t hurt their self but will learn from it. For example if a child was walking along a balancing beam that wasn’t very high with a soft surface underneath then they wouldn’t be at risk of any danger, they may fall but it wouldn’t cause any injury.…

    • 346 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Criminogenic needs can be described as changeable risk factors, that when reduced, result in reduced criminal behaviour. These needs are termed “criminogenic” because they are empirically related to criminal conduct and when reduced, lead to reductions in future reoffending. Therefore, changes in criminogenic needs have a desired effect on changes in criminal behaviour. In the Risk Assessment case study, a number of these criminogenic needs as well as the “central eight” risk factors are evident contributors to the criminal nature and history of the accused. The first and most important criminogenic need in respect to the case is the Family/Marital factor. The accused believed that his wife had been having an affair and he constantly accused her of infidelity and being seductive with other men. These feelings of insecurity led to many years of constant arguments and assault cases with his wife up until he killed her. This is evident in the fact that the first assault case filed against him was when he was aged 37 and the cases lingered up until the accused was 42. This criminogenic need also directly relates with the family and/or marital “central eight” risk factor. The second most important criminogenic need in respect to the case is the Substance Abuse factor. The substance being abused in this case is alcohol. The accused is of the opinion that his antisocial and violent behaviour is motivated by alcohol abuse. Alcohol substance abuse can also be traced in the impaired driving charges accrued by the accused, which served as one of his previous convictions. Alcohol abuse can also be held responsible for his current state of unemployment as it got him fired from previous jobs. Ultimately, it could be the reason why he does not remember the incidents leading to the murder of his wife because he could have been under the influence.…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    7. Communications and operations management: Incorporates operational procedures and responsibilities, third-party service delivery management, systems palnning and acceptance, protection against malicious and mobile code, backup, network security management, media handling, exchange of information, electronic commerce services and monitoring…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Risk Assessment paper

    • 550 Words
    • 2 Pages

    Describe the four main topics of the framework for ecological risk analysis described in Human and Ecological Risk Assessment. The response must involve problem definition analysis, characterization, and management decision making. You may refer to the framework in ecological risk assessment as shown in Figure 6.1 (Ch. 6) in Human and Ecological Risk Assessment.…

    • 550 Words
    • 2 Pages
    Good Essays
  • Good Essays

    RISK ASSESSMENT

    • 1988 Words
    • 8 Pages

    Suspetabiltiy of Defalcation??judgments about materiality are made in light of surrounding circumstances, and are affected by the size or nature of a misstatement, or a combination of both; and…

    • 1988 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Risk Assessment

    • 768 Words
    • 3 Pages

    Several new network storage, security, and throughput hardware appliances need to be installed and configured. (Is there room/power/personnel to support this new hardware?)…

    • 768 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Work submitted may be subjected to a plagiarism detection process. If this process is used, then copies of this work would be retained and used as source material for conducting future plagiarism checks.…

    • 7714 Words
    • 31 Pages
    Powerful Essays
  • Powerful Essays

    I certify that the work submitted for this assignment is my own and research sources are fully acknowledged.…

    • 2352 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Risk Assessment Worksheet

    • 456 Words
    • 2 Pages

    Write a 350- to 700-word summary of at least three risk assessment innovations that were changed or developed in the past 100 years.…

    • 456 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A risk assessment is a procedure which examines a ‘care setting’ or a “care activity” for potential risks and hazards to service users and their carer’s.So, conducting a risk assessment and putting steps in place to reduce the risk is our duty as health and social care workers.…

    • 108 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The risk analysis of an IT asset for each vulnerability comprises of evaluating the dangers and remunerating controls to focus the probability that weakness could be abused and the potential effect ought to the helplessness be misused. For managing the risk impact of a potential threats and vulnerability is to be studied first. Taking into consideration the likelihood and vulnerability risk analysis is done. Risk is proportional to both likelihood of exploitation and possible impact. The discovering and related danger level was utilized to focus the proposals that ought to be connected as a means to alleviate the danger.…

    • 640 Words
    • 2 Pages
    Satisfactory Essays