Preview

Week 10 Technical Paper

Powerful Essays
Open Document
Open Document
2283 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 10 Technical Paper
Every organization is faced with some risk or potential threat that could cause an interruption to the organization’s operations. These risks and threats can come from within or outside of the organization. To prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risks to protect the organization from the possible negative effects to the daily operations. Performing a risk assessment is one of the most important steps in the risk management process (eHow, 2011).

A Risk Assessment is periodic assessment of the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the organization. A risk assessment should include a consideration of the major factors in risk management: the value of the system or application, threats, vulnerabilities, and the effectiveness of current or proposed safeguards.

Many organizations perform risk assessments to measure the amount of risks that could affect their organization, and identify ways to minimize these risks before a major disaster occurs. Department of Defense Information Systems Agency (DISA) follows guidelines and policies governed by processes by which the organization assesses and manages exposure to risks. In this paper the subject to identify is the risks and potential effects associated with the areas of the organization pertaining to security, auditing, and disaster recovery.

Security is divided in three major areas: Physical security includes access to the building, offices, and the rooms housing the organization’s servers and other critical computing devices. External threats to the organization’s computing network such as hackers and malicious software. Access and permission to authorized users of the system as well as to the information.

Physical security of the DISA field office involves

You May Also Find These Documents Helpful

  • Powerful Essays

    RAR Template 07112007 3

    • 5647 Words
    • 25 Pages

    The scope of this risk assessment effort was limited to the security controls applicable to the <System Name> system’s environment relative to its conformance with the minimum DHHS Information Technology Security Program: Baseline Security Requirements Guide. These baseline security requirements address security controls in the areas of computer hardware and software, data, operations, administration, management, information, facility, communication, personnel, and contingency.…

    • 5647 Words
    • 25 Pages
    Powerful Essays
  • Good Essays

    Unit 6 Assignment 2

    • 878 Words
    • 4 Pages

    The problem of risk assessment is an extremely complex one. When a risk assessment process is started, this process has to analyze several aspects in parallel.…

    • 878 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    ISSC363 Assignment 3

    • 586 Words
    • 2 Pages

    At its core, the purpose of a risk assessment is identifying and evaluating risks that may potentially have a negative impact on an organization. It can help management understand the impact in terms of costs to the organization or the severity of a loss depending on the methodology used to conduct the risk assessment. The goal is to provide sound recommendations based on the risk assessment to help maintain data confidentiality, integrity and vulnerability while ensuring functionality and usability. Based on the results, management can make more informed decisions about what resources to protect, how to protect them and understand the potential costs and impact. Once the purpose of the risk assessment is understood, defining the scope is next.…

    • 586 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is 305 Lab 1

    • 538 Words
    • 3 Pages

    * Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the organization…

    • 538 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A risk assessment is nothing more than a careful examination of what, in your work, could cause harm to people, so that you can weigh up whether you have taken enough precautions or should do more to prevent harm.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete situation and a recognized threat, it is also called a hazard. Quantitative risk assessment requires calculations of two components of risk, the magnitude of the potential loss, and the probabilit that the loss will occur. Acceptable risk is a risk that is understood and tolerated usually because the cost or difficulty of implementing an effective countermeasure for the associated vulnerability exceeds the expectation of loss.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit009 Health and Safety

    • 1048 Words
    • 5 Pages

    A Risk Assessment is a carefully examination of what could potentially cause harm to people. It involves identifying hazards present and then evaluating the extent of the risk they pose by carrying out a risk assessment, it should be easier to assess whether or not more controls are needed to prevent harm.…

    • 1048 Words
    • 5 Pages
    Good Essays
  • Good Essays

    File11

    • 466 Words
    • 2 Pages

    appropriate to manage these risks. IT managers then present this information to senior management. The…

    • 466 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    miss

    • 371 Words
    • 2 Pages

    In practical terms, a risk assessment is a thorough look at your home , workplace , to identify those things, situations, processes, etc that may cause harm, particularly to people, staff and children. After identification is made, you evaluate how likely and severe the risk is, and then decide what measures should be in place to effectively prevent or control the harm from happening.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hello

    • 554 Words
    • 3 Pages

    |A risk assessment is a careful examination of what may cause harm within a certain area, once the risks and hazards are identified you |…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    health and safety unit 4

    • 749 Words
    • 3 Pages

    A risk assessment is something that helps to protect yourself and the people around you. It is a requirement in law to complete…

    • 749 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Risk assessment; a risk assessment is a process that identifies and assesses the importance of risk in a situation and then assesses the measures that control it. A risk assessment should be undertaken before a planned outdoor learning experience, and the main findings recorded.…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security Manager Role

    • 1762 Words
    • 8 Pages

    Security takes into account all actions and objectives intended to meet asset safeguard goals to make certain that security problems do not occur. Management of security is defined as multifaceted and interdisciplinary. Security for an organization includes the use of criminal and civil law, inspections, sleuthing, profiling, business management, strategy proposals, psychology, sociology, and technology to shield persons and property. A security manager’s role varies, according to the organizational structure. A security manager takes on managerial, administrative, preventative, and investigative responsibilities and functions.…

    • 1762 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    business plan

    • 429 Words
    • 2 Pages

    This research paper is mainly subjected on issues how the organizations overcoming the risk management. It focuses specifically on need for security, security risk from outer environment and security threats through humans. The following issues are considered for recommending different kind of security strategies, coding and decoding the security , reducing about organization security issues, developing of advance security strategy frame work. These issues are the key roles for developing the advance security in organizations and make stepping stones for security management model.…

    • 429 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Improves the ability of existing incident response team etc. to defend a real time cyber-attack in future.…

    • 730 Words
    • 3 Pages
    Good Essays