Risk Assessment And Risk Analysis

Improved Essays
To protect my company assets from cyber threats/attacks many things must be taken into consideration because there is always a deeper internal issue in what we believe is secure. Risk assessment and risk management are both very important parts of planning to create a safe, secure work environment to protect my employees and company both on the inside and outside of the company. I would assure that my company conducts a risk assessment periodically. This helps to see what has failed in the past versus what improvements and corrective actions have been made to present day. Comparing and contrasting the effects of failures also helps to determine if the current improvement fall into the same category. When checking for vulnerabilities in Information …show more content…
My main goal is to conduct a CIA Triad (Confidentiality, Integrity, and Availability) to the information system by providing and ensuring this is practiced by my employees. But before being able to manage these goals I would have to look deep into the company vulnerabilities and reduce any possible risk to an acceptable level. There are several decisions I can make upon the risk findings discover such as Risk Mitigation. In this process patches may be install to help reduce the risk or fix the problem that originated. With the standards, regulations, and policies implemented a guidebook will be form that will show the guidance to take if certain threats arise that can harm the company. It will also show what is expected of the employees, their rights and the consequences that follow. But in order for me to do this I will provide training to my employees so they are aware and have a better visual of what the company is about and the expectations. Another important thing is assigning roles and responsibilities for the employees, and what each department is expected to conduct in order to keep asset and information …show more content…
I will pass policies that show employees how to construct strong passwords to log in to the system such as P0c0nt@s2132, in which shows not only letters but upper case, symbols, and numbers. As well as, a secret question and password must be provided to provide reassurance that the person logging in is who they say they are. Next would be to have the right and updated anti-virus and malware protections. This will help detect threats that enter the system. Locking your network and applying wired networks, which involves plugging into physical outlets or hacking modem ports. If a wireless network is needed disabling the SSID broadcasting to work on a wireless router for a hidden network. Another important policy would be the internet policy that involves what site are to be blocked, and only company emails are to be open for work purposes. If dealing with secret assets or information, encrypting the information attach with password will be

Related Documents

  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Est1 Task 5.2

    • 972 Words
    • 4 Pages

    5.0 Enforcement 5.1 Should an employee be in violation of Health and Safety Policies and/or Procedures, disciplinary action will be taken in accordance with the General Pipe Disciplinary Policies and Procedures. 5.2. General Pipe expects all supervision including foremen, general foremen, superintendents and management to equally participate in correcting unsafe acts and conditions and in enforcing discipline throughout the company. It is the duty and obligation of supervision to do all jobs within safety and health guidelines. 5.3 Disciplinary action shall be taken as a result of safety violations.…

    • 972 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    The security policies should outline what employees are expected of in regards to complying with the security policies and the consequences…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Evaluate the risk and create policies and procedures to negate or reduce them. Educate and communicate with management and staff about risk factors. Rank risks according to likelihood of occurrences for each dept. Periodically review and update risks, and risks management programs. (Rubbens, 2007)…

    • 819 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Children need to have opportunities to take some risks so that they are able to assess and manage risks as they grow into adulthood. If a child’s experiences of risk assessment and risk taking are limited, they will have difficulty in doing this. If a more balanced approach is taken and children are given more independence, then they are more likely to grow in confidence. They should be encouraged to think about risks for themselves and act…

    • 78 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    PCI Compliance Paper

    • 555 Words
    • 3 Pages

    PCI compliance was first introduced in 1999 by Visa, Inc., in the form of the Cardholder Information Security Program (CISP). CISP was developed as Visa’s way to fight rampant cybercrime, which left credit card companies responsible for fraudulent purchases. (Search Security Staff, 2013) However, companies accepting credit transactions did not adopt the standards provided by CISP because they were quite different from the standards presented by other card companies like Discover, MasterCard, and American Express. In December 2004, the five major credit card lenders joined together to create a uniform set of standards called the Payment Card Industry Data Security Standard (PCI DSS).…

    • 555 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Risk assessments must be carried out to eliminate or reduce risks with any findings recorded. Any arrangements made must be monitored and reviewed by appointed person's with the training, knowledge and skills to carry out these arrangements. It is the appointed person's (Health and Safety Co-ordinator) responsibility to ensure that everyone within the setting is made aware of, read and signed the changed or new policies and procedures. People within the work setting must be made aware of where of the Health and Safety Policy is kept, up to date training must be provided and copies of risk assessments must be given when necessary, for example when going on school trips, all adults on the trip must read the risk assessment specifies such as the minibus for travelling in, wearing visors, appointed first aiders, trip and group leaders and toilet trips. This ensures the staff are aware of risks and hazards, how to deal with them efficiently and who to report…

    • 987 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    - Securing workstations with screen lock or logout screens before leaving the workstation to prevent unauthorized access. - Allow a password-protected screen saver with a short timeout period to ensure that workstations will be protected. - Password need to comply with the Company’s Password requirements. - Ensuring that the workstation is used for intended purposes only. - Employees need to avoid installing unauthorized software on workstations.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Policies and procedures of an organisation are in place in the aim of harmonisation of the work place. It provides a nationally consistent frame work to ensure health safety and welfare of the workers and workplace. All organisations require their staff and all visitors to take reasonable care for health and safety. Managers and staff have a legal duty to work with in the legislation, regulations and their organisations policies and procedures, the organisations workplace health and safety managements plan and standards. Business Organisations need policies and procedures in relation to work health and safety.…

    • 277 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    A Risk Assessment Plan plays a big role in any company, whether it is big or small company. The risk assessment will help identify the vulnerabilities and threats to the Wells Fargo IT resources. Which will help determine the impact of those vulnerabilities, threats, and unauthorized access. Having some knowledge of what type of risks expect will help mitigate them faster. There are a several steps needed for a good risk assessment plan, which will essentially help the company be in compliance with FISMA and other federal laws.…

    • 720 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    .The cardinal reasons responsible for hazardous activities as per these code of conducts are emission of inflammable or toxic fluids due to leakage problem, lost control over controlled operational processes, sudden fires or explosion on working site due to short circuits and last but not the least is damage to structure of transportation ships and carriages due to collision leads to total failure of ship or carriage. In order to support these rational facts, some incidents can be analyzed from the past that will provide a crystal clear view to the scenario (Godoy et al. 2012). In year 2009, a very strong and reputed company of India ,Indian Oil Company has its plant in south side of Jaipur where during a particular operation of transferring…

    • 1227 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Quantitative Risk Analysis

    • 1299 Words
    • 5 Pages

    Quantitative risk analysis is the one which follows the Qualitative analysis, and gives a numerical priority rating to project risks (PMI, 2009). Based on the PMBOK (PMI, 2013) quantitative risk analysis “… is the process of numerically analyzing the effect of identified risks on overall project objectives (p. 333).” This is also a process for the PM and project team to get risk data to support making decisions, which can help to reduce project uncertainties (PMI, 2013, p. 333). Based on the prior researchers’ statement, the Quantitative Risk Analysis is more complicate and even the most difficult part within risk management since it requires statistical and mathematical methods to be operated (Purnus & Bodea, 2013, p. 145). Inputs of this…

    • 1299 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    • Development of workplace policies to ensure fairness and continuity within the organization. Following policies such as discipline process, vacation time, dress code, ethics an internet usage policy. • Compensation and benefits, includes anything the employee receives for his or her work. These involves setting up pay, health benefits, vacation time, sick leave, and 401K. • Retention keeping and motivating employees to stay with the organization • Training and development. Such as job skills training, communication and team-building • Dealing with Laws affecting employment such as discrimination laws, health-care requirements, compensation requirements; minimum wage, worker safety laws and labor…

    • 820 Words
    • 4 Pages
    Improved Essays