Preview

risk assessment

Powerful Essays
Open Document
Open Document
4141 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
risk assessment
5CI003 IT Risk Analysis

ASSIGNMENT Submission (Sem 1 – 2013-14)

Lastname : Mark

Firstname: Bash

Student Number: 1124409

Declaration :

I declare that this submission is my own work and has not been copied from someone else or commissioned to another to complete. Any materials used in this work (whether from published sources, the Internet or elsewhere) have been fully acknowledged and referenced and are without fabrication or falsification of data.
I have adhered to relevant ethical guidelines and procedures in the completion of this assignment. I have not allowed another student to have access to or copy from this work. The work has not been submitted previously.

By this declaration and by submitting this work, I confirm my understanding that –
The University may submit this work to the national plagiarism detection facility. This searches the Internet and an extensive database of reference material, including other students work and available essay sites., to identify any duplication with the work you have submitted. Once your work has been submitted to the detection service it will be stored electronically in a database and compared against work submitted from this and other universities. The material will be stored in this manner indefinitely.
Contents

1.0 Introduction

2.0 Risks to the Organisation and its IS/IT

3.0 Evaluation of risks

4.0 Countermeasures

5.0 Recommendation of measures to be taken to protect the business and priorities

6.0 References

Introduction

The company Trendmaster Limited is has been trading for 2 years from a converted barn, the business plan is to expand and move to a bigger premises that is 2 stories and significantly bigger. The new building is based near to a busy ring road in a large town, because of the business growing 4 additional staff have been hired in an attempt to continue with the



References: Doz, Y. (2001) From Global to Metanational: How companies win in the knowledge economy. Harvard Business Press Lewis, R. (2012) Business Income Insurance Disputes. Aspen Publishers Online Macdonald, L. (2008) How to Manage Problem Staff Successfully. Aspen Publishers Online Staightforward co Ltd Mana. (2012) Preventing Accidents Super Series. Routledge Shoniregun, C. (2006) Impacts and Risk Assessments of Technology for Internet Security. Springer Steinberg, T. (2006) Acts of God: The Unnatural History of Natural Disaster in America. Oxford University Press Waterman, I. (2013) Disabled access to facilities. Routledge

You May Also Find These Documents Helpful

  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    7. Communications and operations management: Incorporates operational procedures and responsibilities, third-party service delivery management, systems palnning and acceptance, protection against malicious and mobile code, backup, network security management, media handling, exchange of information, electronic commerce services and monitoring…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Powerful Essays

    P2 M2 D2 with front sheet

    • 1295 Words
    • 6 Pages

    I certify that the work submitted for this assignment is my own and research sources are fully acknowledged.…

    • 1295 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Criminogenic needs can be described as changeable risk factors, that when reduced, result in reduced criminal behaviour. These needs are termed “criminogenic” because they are empirically related to criminal conduct and when reduced, lead to reductions in future reoffending. Therefore, changes in criminogenic needs have a desired effect on changes in criminal behaviour. In the Risk Assessment case study, a number of these criminogenic needs as well as the “central eight” risk factors are evident contributors to the criminal nature and history of the accused. The first and most important criminogenic need in respect to the case is the Family/Marital factor. The accused believed that his wife had been having an affair and he constantly accused her of infidelity and being seductive with other men. These feelings of insecurity led to many years of constant arguments and assault cases with his wife up until he killed her. This is evident in the fact that the first assault case filed against him was when he was aged 37 and the cases lingered up until the accused was 42. This criminogenic need also directly relates with the family and/or marital “central eight” risk factor. The second most important criminogenic need in respect to the case is the Substance Abuse factor. The substance being abused in this case is alcohol. The accused is of the opinion that his antisocial and violent behaviour is motivated by alcohol abuse. Alcohol substance abuse can also be traced in the impaired driving charges accrued by the accused, which served as one of his previous convictions. Alcohol abuse can also be held responsible for his current state of unemployment as it got him fired from previous jobs. Ultimately, it could be the reason why he does not remember the incidents leading to the murder of his wife because he could have been under the influence.…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Work submitted may be subjected to a plagiarism detection process. If this process is used, then copies of this work would be retained and used as source material for conducting future plagiarism checks.…

    • 7714 Words
    • 31 Pages
    Powerful Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The risk analysis of an IT asset for each vulnerability comprises of evaluating the dangers and remunerating controls to focus the probability that weakness could be abused and the potential effect ought to the helplessness be misused. For managing the risk impact of a potential threats and vulnerability is to be studied first. Taking into consideration the likelihood and vulnerability risk analysis is done. Risk is proportional to both likelihood of exploitation and possible impact. The discovering and related danger level was utilized to focus the proposals that ought to be connected as a means to alleviate the danger.…

    • 640 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Btec It Level 2

    • 800 Words
    • 4 Pages

    I certify that the work submitted for this assignment is my own and research sources are fully acknowledged.…

    • 800 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Risk Assessment Paper

    • 907 Words
    • 3 Pages

    Leukemia is the malignant disorder of white blood cells in which the cells become abnormal and divide without control or order. Hematopoietic stem cells, also known as hemacytoblasts, are found in bone marrow and are the precursor to erythrocytes (red blood cells), leukocytes (white blood cells) and thrombocytes (platelets). Leukemia is caused by the mutation of the bone marrow pluripotent or most primitive hematopoietic stem cells (Caldwell, 2007). The mutations during hematopoiesis causes uncontrolled proliferation of stem cells resulting in overcrowding of bone marrow and decreased production and function of normal hematopoietic cells (Huether, 2012). The leukemic stem cells will then enter the blood stream affecting other organs such as the liver, spleen, lymphnodes, and under certain circumstances the central nervous system. The mutant clone may demonstrate unique morphologic, cytogenic, and immunophenotypic features that can be used to classify the particular type of leukemia (Caldwell, 2007). Leukemia can be fatal if left untreated because of the inhibited ability to produce and provide normal red blood cells, white blood cells, and plates to maintain homeostatic mechanisms.…

    • 907 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    unit 4

    • 607 Words
    • 3 Pages

    I certify that the work submitted for this assignment is my own and research sources are fully acknowledged.…

    • 607 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Assignment Brief

    • 1434 Words
    • 7 Pages

    I certify that the work submitted for this assignment is my own and research sources are fully acknowledged.…

    • 1434 Words
    • 7 Pages
    Good Essays
  • Good Essays

    3.4 summarise the types of risks that may be involved in assessment in own area of responsibility.…

    • 868 Words
    • 4 Pages
    Good Essays
  • Good Essays

    I certify that the work submitted for this assignment is my own and research sources are fully acknowledged.…

    • 1471 Words
    • 13 Pages
    Good Essays
  • Good Essays

    2014 Cover Sheets

    • 696 Words
    • 3 Pages

    The use of any material in this assignment does not infringe the intellectual property / copyright of a third party…

    • 696 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Assessing Risk

    • 781 Words
    • 4 Pages

    MY NAME What is it I want to do What are the benefits to me in doing this? What might go wrong? What might happen if I don’t do this? DATE…

    • 781 Words
    • 4 Pages
    Satisfactory Essays