Preview

Risk Analysis of an IT Asset

Satisfactory Essays
Open Document
Open Document
640 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk Analysis of an IT Asset
ASSIGNMENT

1. Lab #5 – A four-paragraph executive summary written to executive management providing a summary of findings, risk impact to the IT asset and organization, and recommendations for next steps.

The risk analysis of an IT asset for each vulnerability comprises of evaluating the dangers and remunerating controls to focus the probability that weakness could be abused and the potential effect ought to the helplessness be misused. For managing the risk impact of a potential threats and vulnerability is to be studied first. Taking into consideration the likelihood and vulnerability risk analysis is done. Risk is proportional to both likelihood of exploitation and possible impact. The discovering and related danger level was utilized to focus the proposals that ought to be connected as a means to alleviate the danger.
Risk impact and findings to the IT asset
Performance of regular stock takes
Findings- IT don't perform compromises to guarantee that the benefit database records totally and precisely mirrors the genuine stock held in the store rooms. Best routine of benefit administration incorporates performing general stock takes of advantages held inside of nearby stores, to guarantee that they are precisely reflected inside the Council's records.
Risks- There is a hazard that the stock recorded on the database is incorrect or deficient. This may be because of stock being expelled from the store room and IT not being educated in of any development. There is an uplifted danger of extortion or robbery, as lost resources may not be distinguished.
Recommendations- Service Desk group ought to perform an occasional stock number to affirm that all advantages recorded as being 'in stock' inside of the inventories are finished and exact. Any errors ought to be researched and recorded in like manner inside of the advantage register and budgetary frameworks.
Upkeep of the IT Asset Inventory
Findings- We take note of that another framework is as of now being

You May Also Find These Documents Helpful

  • Better Essays

    There are many types of risks that a company has to confront each day in information technology (IT). The four main types of risk are business, audit, security, and continuity risks. A business risk is when a company will not be able to achieve its goals and objectives; this could be union issues, a competing company, fraud, or production equipment failure. Audit risks include misstatement of financials by an auditor or a failure by an auditor to uncover fraud or material errors. A security risk can be a host of things that would ruin the integrity and access of the data, which can also lead to fraud or misuse of other information from internal (like employees) to external (like hackers) sources. And, finally, continuity risks are information system risks that have to do with backup, recovery and day to day availability of the system. When unplanned risks occur, management and auditor need to act quickly to intercept the risk, balance the risk with cost-effective countermeasures, since it is impossible to plan all risks (Hunton, Bryant, & Bagranoff, 2004).…

    • 1178 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    RAR Template 07112007 3

    • 5647 Words
    • 25 Pages

    The <System Name> risk assessment was conducted in accordance with the methodology described in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-30, Risk Management Guide for Information Technology Systems. The methodology used to conduct this risk assessment is qualitative, and no attempt was made to determine any annual loss expectancies, asset…

    • 5647 Words
    • 25 Pages
    Powerful Essays
  • Powerful Essays

    Finally, alternative 3 and 4 are recommended. In addition, there are some aspects to be noticed during the short-term and long-term implementation. It is recommended for the company to bring down the age of inventory to near to the industry average by improve the inventory control system. Paul should pay attention to his personal financial condition. It is necessary for him to save some money and reduce the withdraw from Lawsons.…

    • 2224 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Chapter 9 Quiz

    • 1442 Words
    • 6 Pages

    provides reliable results in cases where the distribution of items in the inventory is different from that of items sold during the period.…

    • 1442 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 4 Definitions  Risk: Probability that an intentional or unintentional act will harm resources  Threat: Any accidental or intentional event that negatively impacts company resources  Vulnerability: Inherent weakness that may enable threats to harm system or networks Risks, threats, and vulnerabilities affect confidentiality, integrity, and availability (CIA). NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    There are quite a few vulnerabilities that can affect organizations productivity. These vulnerabilities can be environmental, utilities & service, criminal behavior, equipment failure, and information security issues. To protect the organization against loss of productivity and data loss we have created an assessment of the potential danger each category of threat presents. We created a worksheet (located on the last page of this document) listing each type of vulnerability and ranked the probability and severity of each of the threats. Using a probability and severity legend that had one…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Is 305 Lab 1

    • 538 Words
    • 3 Pages

    * Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the organization…

    • 538 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations. Given the list, select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability.…

    • 404 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Auditing

    • 3280 Words
    • 14 Pages

    The company has fairly voluminous purchase transactions. The company overcomes the inherent problems of obsolescence and overstocking by tight inventory control. However, The inventory is vulnerable to theft thereby reducing the overall reliability of internal control in terms of faithful representation and undermines quality of operations. Also unrestricted access to warehouse further increases risk.…

    • 3280 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Case Study on Risk Analysis

    • 3460 Words
    • 14 Pages

    A Case Study in Successful Risk-Based Testing at CA Introduction This article presents a case study of a risk-based testing pilot project at CA, the world 's leading independent IT management software company. The development team chosen for this pilot is responsible for a widely-used mainframe software product called CA SYSVIEW® Performance Management, an intuitive tool for proactive management and real-time monitoring of z/OS environments. By analyzing a vast array of performance metrics, CA SYSVIEW can help organizations identify and resolve problems quickly. Companies are highly dependent on the reliability of their mainframe systems. If the mainframe doesn’t run, the company stops. Mainframe workloads also are growing considerably as companies’ businesses grow and as they continually seek to leverage data and applications in new ways. At the same time, these companies are losing their experienced mainframe workforce, largely to retirement. This makes the quality of their mainframe management tools even more important to them. CA piloted risk-based testing as part of our larger effort to ensure the quality of the solutions we deliver. The pilot consisted of six main activities: • • • • • • Training key stakeholders on risk-based testing Holding a quality risk analysis session Analyzing and refining the quality risk analysis Aligning the testing with the quality risks Guiding the testing based on risks Assessing benefits and lessons…

    • 3460 Words
    • 14 Pages
    Good Essays
  • Good Essays

    Just in Time

    • 1336 Words
    • 6 Pages

    Disadvantages include the costs for storage and security of the stockpiles which leads to an opportunity cost as the government cant spend money in other sectors. If supply continues to increase without disruption then it will mean the government has to purchase more surplus stock and store which may become more expensive. Conversely their may be an event which causes a decrease in the supply which would mean the government has to use up its stockpile, if this continues and the government runs out of stock then the market price will eventually exceed the maximum price and so render the buffer stock system inept. The price range may be inaccurately set in the first place which would also cause problems. The stocks may be perishable over a long period of time, which means the government can lose money if it has to destroy stock.…

    • 1336 Words
    • 6 Pages
    Good Essays
  • Good Essays

    non staff expenditure

    • 467 Words
    • 2 Pages

    In order to avoid unnecessary stock inventory, it is vital to check whether the item can be used, its price and effectiveness. As being manager, future planning should be done about total estimate of the daily used item. They should also be dynamic about an ever changing need in wards such as when and how much is required. This promotes the proper management of non-staff expenditure, as a result, directly affects the delivering of high quality care and ensure patient safety.…

    • 467 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Stock Records Accuracy

    • 36220 Words
    • 145 Pages

    'Stock Records Accuracy' means: (1) a correspondence between what is present on the computer file and what physically exists, in reality, (2) that activities which have been recorded as taking place against stock are truly what in fact occurred, and (3) that no activity which took place is unrecorded in the system. As we shall see, the central stock file is a most important element of any system within the company. The records within the file are 'keyed' on each product's unique item code**. That is , specifying an item code enables the system's user to find and retreive an item's record on the VDU directly. In many companies also, it is necessary or desirable to keep track of physically discrete batches of the item in order to facilitate lot tracing or to differentiate batches of the item having different quality. In addition, in a variable (or 'random') location store or warehouse, since stock of the item is potentially stored in many locations, the stock record will consist of many groups of data under the main item key, with each group within the record showing a quantity of stock and the location where that stock quantity is stored. Many of the data fields on the stock record are unchaging - obvious examples are an item's code, name and unit of measure (eg square feet, each, kilograms). Other data elements are relatively static, but do change from time to time. Examples are annual usage, standard cost or standard purchase price. Although the concern of this on-line Course is with stock quantities, procedures should be in place to update static and semi-static data as needs be. As well, one might also regard the transactions raised in the course of maintaining the system as being part of the stock record. Although the role of transactions is to change the main record, by communicating through the system data relating to what has physically occurred so that it can be used to modify the main record, such transactions can be displayed separately and…

    • 36220 Words
    • 145 Pages
    Good Essays