Risk Assessment And Risk Analysis

Improved Essays
To protect my company assets from cyber threats/attacks many things must be taken into consideration because there is always a deeper internal issue in what we believe is secure. Risk assessment and risk management are both very important parts of planning to create a safe, secure work environment to protect my employees and company both on the inside and outside of the company. I would assure that my company conducts a risk assessment periodically. This helps to see what has failed in the past versus what improvements and corrective actions have been made to present day. Comparing and contrasting the effects of failures also helps to determine if the current improvement fall into the same category. When checking for vulnerabilities in Information …show more content…
My main goal is to conduct a CIA Triad (Confidentiality, Integrity, and Availability) to the information system by providing and ensuring this is practiced by my employees. But before being able to manage these goals I would have to look deep into the company vulnerabilities and reduce any possible risk to an acceptable level. There are several decisions I can make upon the risk findings discover such as Risk Mitigation. In this process patches may be install to help reduce the risk or fix the problem that originated. With the standards, regulations, and policies implemented a guidebook will be form that will show the guidance to take if certain threats arise that can harm the company. It will also show what is expected of the employees, their rights and the consequences that follow. But in order for me to do this I will provide training to my employees so they are aware and have a better visual of what the company is about and the expectations. Another important thing is assigning roles and responsibilities for the employees, and what each department is expected to conduct in order to keep asset and information …show more content…
I will pass policies that show employees how to construct strong passwords to log in to the system such as P0c0nt@s2132, in which shows not only letters but upper case, symbols, and numbers. As well as, a secret question and password must be provided to provide reassurance that the person logging in is who they say they are. Next would be to have the right and updated anti-virus and malware protections. This will help detect threats that enter the system. Locking your network and applying wired networks, which involves plugging into physical outlets or hacking modem ports. If a wireless network is needed disabling the SSID broadcasting to work on a wireless router for a hidden network. Another important policy would be the internet policy that involves what site are to be blocked, and only company emails are to be open for work purposes. If dealing with secret assets or information, encrypting the information attach with password will be

Related Documents

  • Decent Essays

    Policies and procedures of an organisation are in place in the aim of harmonisation of the work place. It provides a nationally consistent frame work to ensure health safety and welfare of the workers and workplace. All organisations require their staff and all visitors to take reasonable care for health and safety. Managers and staff have a legal duty to work with in the legislation, regulations and their organisations policies and procedures, the organisations workplace health and safety managements plan and standards.…

    • 277 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Risk assessments must be carried out to eliminate or reduce risks with any findings recorded. Any arrangements made must be monitored and reviewed by appointed person's with the training, knowledge and skills to carry out these arrangements. It is the appointed person's (Health and Safety Co-ordinator) responsibility to ensure that everyone within the setting is made aware of, read and signed the changed or new policies and procedures. People within the work setting must be made aware of where of the Health and Safety Policy is kept, up to date training must be provided and copies of risk assessments must be given when necessary, for example when going on school trips, all adults on the trip must read the risk assessment specifies such as the minibus for travelling in, wearing visors, appointed first aiders, trip and group leaders and toilet trips. This ensures the staff are aware of risks and hazards, how to deal with them efficiently and who to report…

    • 987 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much. A balanced tradeoff keeping in mind your most sensitive resources will help to find a good balance.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Est1 Task 5.2

    • 972 Words
    • 4 Pages

    Consistently act in a safe manner, being constantly aware of their surroundings, work conditions, equipment operation and the activities of others.…

    • 972 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    After analyzing the current situation of accounting firms, it seems that this organization understands the importance of information security but it is severely lacking. This requires to introduce a user training program to make every employee understands the importance of how they behave themselves every day in protecting the company’s network…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Allow a password-protected screen saver with a short timeout period to ensure that workstations will be protected.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Risk Assessment Definition

    • 1802 Words
    • 8 Pages

    Risk is everywhere. Risk assessment is everywhere. Think about almost everything you do today, you are thinking a million miles a minute in your brain about the risk. Your thinking, “is this safe? How safe is this? What are the risk to doing this?” Every day the Department of Homeland Security is doing this risk assessment on everything in its control. These assessments are being done on facilities, areas, events and personnel that it is ultimately responsible for. The Department of Homeland Security has a formula to assign a level to the assessments being done.…

    • 1802 Words
    • 8 Pages
    Improved Essays
  • Decent Essays

    Vickie Paterra provided an update of the Corporate Responsibility Program (attachment VII.A). Ms. Paterra provided a summary the FY2017 Risk Assessment methodology, highlighting the ranking process and the top 10 risk areas of Ascension Texas. In addition, Ms. Paterra talked about the regulatory compliance findings that required action and outlined the 2016 Annual Competency completion.…

    • 80 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    The emergency response plan will cover three types of emergencies in Atlanta, Georgia community as discussed earlier. The emergencies include winter storms, tornadoes, and floods. The hazard and vulnerability analysis will focus attention on these hazards, which are highly likely to have a great impact on Atlanta, Georgia community and its facilities. Four categories will be used to place each disaster into perspective. The categories include probability, response, property impact, and human impact. For this paper, vulnerability is defined as lives, wealth, and structures that might be possibly exposed to an environmental disaster.…

    • 1000 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    PCI Compliance Paper

    • 555 Words
    • 3 Pages

    In order for companies to maintain compliance with PCI DSS, the PCI SSC established The Prioritized Approach to assist organizations in identifying areas of concern and reducing risk. As part of this approach, six goals were determined to be critical milestones that can be regarded as a roadmap for ensuring protection against security…

    • 555 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    An organization’s security posture is only as good as the personnel that work for the company. As such, the organization must define policies that ensure the safety, and security of its personnel. The policy should include physical security, as well as processes that ensure that personal data is protected. The company should only collect personal information when required, and disclose how the personal information is going to be used. Personnel security should be a top-down approach, with all levels of management in agreement on how best to administer the policy, and enforce it.…

    • 995 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    First, identify risks through researching areas of high concern including; Software instillations (technology risks), area that the business is located in (environment risks), building management (workplace hazards), and internal and external employees (personal risks). Second, include all areas of management in the development and initiation of the plans including training employees in the event of an emergency. Third, assign areas of risk consistent management supervision, and enforce precise communication. Finally, “Common metrics include the number of risk assessments and business impact analyses (BIAs) conducted or reviewed on time, number of plans, which business units have plans, plans reviewed on time, plan teams trained on time, plans exercised on time, awareness sessions completed, etc. (Kadar, 2015,…

    • 657 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The risk assessment process consists of risk identification, risk analysis, and risk evaluation (Fraser & Simkins, 2010 p. 11). Risk identification involves identifying risks that are associated with the organization decisions, policies, and guidelines. It uses historical data in relation to credit risks, operational risk, market risks, technological risks, human behavior risks, country risks, and any other risks that may be deemed appropriate. If can be useful and necessary to use scenarios as this can be a realistic situation. Risk analysis gives the understanding of the risk and allows the organization, human resource, or risk management employee to determine if the risk is severe or not and if to take actions to prevent it, correct it,…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    A Risk Assessment Plan plays a big role in any company, whether it is big or small company. The risk assessment will help identify the vulnerabilities and threats to the Wells Fargo IT resources. Which will help determine the impact of those vulnerabilities, threats, and unauthorized access. Having some knowledge of what type of risks expect will help mitigate them faster. There are a several steps needed for a good risk assessment plan, which will essentially help the company be in compliance with FISMA and other federal laws. Creating teams to work on the risk assessment plan will make it that much better and easier to come up with.…

    • 720 Words
    • 3 Pages
    Decent Essays