Risk Management Plan Paper

Great Essays
In this section of the project, we will discuss how to mitigate, avoid, accept, or transfer the previously discussed risks. In the Risk Assessment Plan, we listed all the various risks that could interfere with operations at DLIS. The table below (Table 1.2) explains in further detail the type of mitigation we have chosen, as well as the particular strategy we will use to handle each risk.
 Table 1.2 – Risk Mitigation Strategies
Risk Factor Mitigation Type Mitigation Strategy
Building fire Mitigation Install proper fire containment systems in all site buildings; fire extinguishers near staff
Server failure Mitigation Network administrators monitor hardware at regular intervals for deviation from baseline; spare parts are kept in secure storage
…show more content…
A building fire is properly mitigated with fire containment systems such as fire sprinklers and fire extinguishers, though site staff must be reminded and properly trained on when, where and on what to use the extinguishers. Site security is trained to alert site staff in the event that a fire breaks out, so that it can be dealt with before it turns into a more severe scenario. Hardware failures such as server and workstation issues will be handled by the network administrators. They are trained and certified to perform these types of repairs, and they will also have access to the secure storage room where spare parts are …show more content…
They must keep management informed of absolutely any suspicious activity, and they must monitor the networks constantly when there are no other issues to work out. With the proper personnel, these threats have been mitigated. Natural disasters such as floods will most likely not affect the black site due to its location in a high elevation. Due to this circumstance, we have decided to accept the risk associated with floods. Hardware vandalism and theft are also unlikely, although the chances of them occurring are not zero. Physical security onsite will prevent any equipment from being taken outside of the site, and all of the equipment being used have small GPS tracking devices installed in obscure places so that they can be tracked in the event that security is somehow bypassed. Finally, we address the issue of user error such as the deletion or erasure of files. Although we cannot complete prevent such issues from occurring, proper training programs will help to mitigate these issues. For the rest that slip by, such as accidental deletion of key site files and folders, we mitigate this risk by performing full back-ups and can restore almost any amount of data within a short period of

Related Documents

  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    In 1993 the Our Lady of Guadalupe parish found during a community needs assessment, that for those in their area there was a need to server others. The assessment found that there was a need minister health care to the indigent population in their area, but that there were problems that prevented this. Those problems were the barriers to health care in the form of language, cost and other problems that prevented this indigent population from seeking health care help. Those people their area suffered from teen pregnancy, drug and alcohol abuse, as well as other protracted diseases.…

    • 631 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    For instance loss of time in a business can cause major issues like money loss and also the frustration for customers and staff. The problems that can cause the loss of time can be like power cuts, floods, fires or a user infecting the network by putting in a USB which can be potentially infected from their home computers. To stop this happening in a short time you should have some emergency generators, data backups this is a good plan when the system is offline. Business information loss: If a business has an unsecured network, other big companies can use that time to see any of the records for that business. There are some programs online which allow you to access any important information such as account names, usernames, password and many more on an unsecured wireless network.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    PCIS System Errors

    • 635 Words
    • 3 Pages

    The Frustrations of I.T. in Healthcare Tai Greene Kaplan University Are you tired of sitting in the E.R. wondering why is it taking so long to get discharged from the hospital, or why is taking forever for the doctor to see you your answers lie within this article? Here is my rough draft although it is not fully completed and well thought out as of yet I am giving it a try. I am not sure if the order of my draft makes sense but I am willing to tweak it here and there to make it perfect. I will be greatly appreciated of all feedback mostly negative to help me improve.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Escalation Policy Pathways Industries Policy Overview This policy provides guidelines for responding to misuse of Pathways Industries IT and network resources either from internal or external sources. This policy will attempt to provide contact information for reporting incidents and when to involve Pathways Industries Executive Team, and or company legal representatives. Attacks on Pathways Industries resources could be considered as theft of intellectual property or other computer network attack. All staff members will receive regular training on acceptable use and incident handling procedures of all Pathways Industries resources.…

    • 738 Words
    • 3 Pages
    Great Essays
  • Decent Essays

    Macy’s Inc. relies extensively on technology and on its information systems to process transactions, compile results and operate its business. As an advantage, Macy’s Systems and Technology, Inc. engages in creating, collecting, and directing pieces of data to form management tools. The company implements integrated retail, e-commerce, and data warehouse systems. As a disadvantage, the information systems can be subject to interruption from power outages, damage from viruses, cyber-attack or other security breaches. In these cases, companies like Macy’s may experience the loss of critical data and delays in its processes.…

    • 111 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    M3A1 Process Essay Assignment William Bromley October 7, 2015 About this guide: This end user guide is written and designed specifically for new end users at the college. This will provide easy, step by step details for logging onto SysAid and performing self-service reporting to the help desk. Welcome to the College help desk where we are responsible for managing technical support issues, service requests and incidents submitted by the end user community. As a new end user, you’ll be responsible for learning a powerful new self-service tool called SysAid.…

    • 540 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    The external risk layer involved in California is severe thunderstorm which is huge risk to the client as thunderstorm is such kind of risk which can on the whole effects labors, property and profitability of the client because as risk of severity of thunderstorm increase it might create air of terror and if any point of time if thunderstorm took place it will prove as threat to live of the labor, threat to infrastructure of the company and the profitability of the client. Same happened to client when severe thunderstorm hit the organization cause electricity cut off for several hours and client had to shift to work from home recovery plan. Because of which company has inform all the clients through hotline about the situation has to borne…

    • 904 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    It’s great that each day technology is taking new phases and flourishing its potentiality, but the advancing field is also becoming a growing opportunity for invaders to breach security. By the time you recognize the attack, damage is already done, leaving you with nothing but an infected system. To prevent potential data injury, you need to be quick and proactive. Here are few steps that can help offset the deadly…

    • 409 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Findings --IT Management The IT Management controls appear to be properly implemented and effectively working for FFC. The assessed level of risk is low. FFC has a strong IT strategic plan that is in line with the corporate strategic plan which has a diverse set of strong members on the committees and allows for fundamentally sound decisions that are best for the organization by taking all aspects of the business into consideration. The organizational structure is conducive to a strong and clear reporting channels which include the CIO reporting to the CFO and EVP.…

    • 1213 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Supervisors should conduct network monitoring to identify areas of risk. Security officers should ensure that only people with approval access the control room. Once the management approves the mechanism of putting a firewall in place, implementation through the use of security codes and key cards for high level authorized personnel (Johnson, 2014). Workers will get training on ways of using the system and detecting threat to ensure that there is no loop hole for data manipulation. In terms of maintenance, the company will update the system; antivirus software’s and change passwords regularly as a way of improving the control…

    • 1257 Words
    • 6 Pages
    Great Essays
  • Great Essays

    These policies, procedures and processes must include how the laboratory will operate to meet the relevant good practice and forensic science and quality standards. These goals can be achieved by employee training/certification, and establishing baselines for skill level, experience and education for each investigator in the laboratory. A disaster recovery plan should also be established to specify the procedure to restore workstations and servers to their original state following a catastrophic failure. The organization should also have a process of configuration management to record all updates done to the…

    • 899 Words
    • 4 Pages
    Great Essays