Introduction
One of the most valuable assets of my computer is its data. The data stores in my computer itself vary among of my personal details and my organization's circumstances and economic status which were collected by me in the last few years. Without personal data, various documents and many paid software of my computer useless. Risk management audit data has accessed a computer or network which vulnerabilities and discovered to take measures to manage the risk.
Risk Management Steps
Many times we do not address, and it has not felt it necessary to maintain its threat of our computer. It is very importance to understand how to protect the risk. My personal information is as valuable such as …show more content…
personnel information, financial details, and property details. These steps involve focusing on assets and threats, to identify and mitigate the risks of vulnerability assessment, risk assessment. Risk management is a process to determine as it relates to threats, such as the possibility of equipment failure, physical disasters, loss of criminal attacks.
Identification of assets
My assets will include the hardware for PC, software, operating systems (OS), web access, and I created my data. Without me, these interesting and entertaining articles will not be exposed.
My hardware resources including the manufacturer, model, type, serial number, location and address of the computer, such as Internet Protocol (IP) or Media Access Control (MAC) and any other unique information is known to determine the said hardware identification.
My equipment asset assessment below:
Hardware asset identification
Manufacturer Model Type Serial Location Windows
Asus laptop W891071A Home 00:24:7c:98:2c:10
Threat Identification
The next step would be to identify threats from various risk "agent." These agents may include factors but not limited to theft, operating system failure, damage, destruction system, human error and natural disasters. These agents are among the few factors that can be determined.
Example of my threat agent’s identification given below:
1. Threat Agents
2. Theft OS Failure Compromised System, Software Attacks.
Vulnerability Estimation
The third step will require a susceptibility assessment to determine what security threats, vulnerabilities may occur. This vulnerability estimation results in an eyeball of my security posture. It could be incorrect configured, wrong hardware settings or the lack of wireless security, such as Wi-Fi Protected Access 2 (WPA2).
Risk Assessment
The fourth step is to include a possible attack involving these, what is the risk of tissue damage to determine the vulnerability risk assessment. Identify risks require different types of vulnerability assessment or real attack may occur. These risks and position range from mild to catastrophic events. An example of risk assessment given below:
Risk Assessment
1.
Misconfigured
2. Software Virus
3. Cyber Attack
4. Cyber Enslaved Stolen
5. Lost
6. Misplaced Inoperative
7. Fire Damage
Risk Mitigation
Finally, when the identification, appraisal and assessment, should determine what we need to do this. To accept what they are, and what I will take to solve the problem.
I always used WPA2, which is encrypted to protect my wireless access point (AP).
I have configured to prevent unauthorized applications, programs and services to accept incoming connections, and my knowledge to protect my system from attack personal firewall. I have enabled the "stealth mode", which guide my computer does not respond or confirm trying to access my computer. Stealth mode will ignore or can ping scan computer application.
When I am traveling, I'm tired of my computer bag with me, and I make sure I have it with me at all times. I also have my portable installation function called "Find My PC," so I can track my laptop or PC by global positioning system (GPS) tracking. If stolen, I have a remote computer locking system and remote wipe options which can remove all data from my hard disk drive, even if no user
login.