IT Risk Analysis
Project description
LO1 – You will be able to apply appropriate theory, tools and techniques to the assessment and development of secure computer-based systems.
Specifically, you will be able to identify assets in an organisation and evaluate potential threats and the losses that may be incurred as a result of those threats. You will use risk analysis methods to assist in that process and will be aware of available tools to enable that process.
LO2 – You will be able to identify and specify IT Security requirements to meet business needs.
From analysis of the business needs of an organisation you will be able to identify the basic IT security policies and procedures required to operate in a secure way.
LO3 – You will be able to analyse and evaluate risks to an organisation and its IT assets and recommend appropriate countermeasures to IT system.
Having determined the risks that an organisation may face in respect of IT Security, you will be able to evaluate these in terms of probability of occurrence and impact on the organisation, and will be able to recommend appropriate steps to be taken based on your evaluation.
Description of Module
The module aims to develop an understanding of the risk and threats that may affect IT systems and electronic business. The module will enable you to use tools and techniques to analyse those risks and evaluate their consequences. You will learn how to apply countermeasures to eliminate those risks or reduce the consequences should a risk or threat incident occur.
Learning Outcomes
LO1 – You will be able to apply appropriate theory, tools and techniques to the assessment and development of secure computer-based systems.
LO2 – You will be able to identify and specify IT Security requirements to meet business needs.
LO3 – You will be able to analyse and evaluate risks to an organisation and its IT assets and recommend appropriate countermeasures to IT system
Interpretation of learning Outcomes
LO1 – You will be able to apply appropriate theory, tools and techniques to the assessment and development of secure computer-based systems.
Specifically, you will be able to identify assets in an organisation and evaluate potential threats and the losses that may be incurred as a result of those threats. You will use risk analysis methods to assist in that process and will be aware of available tools to enable that process.
LO2 – You will be able to identify and specify IT Security requirements to meet business needs.
From analysis of the business needs of an organisation you will be able to identify the basic IT security policies and procedures required to operate in a secure way.
LO3 – You will be able to analyse and evaluate risks to an organisation and its IT assets and recommend appropriate countermeasures to IT system.
Having determined the risks that an organisation may face in respect of IT Security, you will be able to evaluate these in terms of probability of occurrence and impact on the organisation, and will be able to recommend appropriate steps to be taken based on your evaluation.
For the scenario:
1. Identify Risks to the organisation surrounding the information technology and information systems used with in the case study context.
2. Analyse and evaluate the identified risks which you highlighted in part 1.
3. Identify and justify appropriate countermeasures to the identified risks. A full range of alternative or complimentary countermeasures to an identified risk should be considered
5. Detail recommendations for the organisation of appropriate solutions to suit their needs, with justification of approach and prioritized implementation schedule.
This is a teaching case, prepared purely for the purpose of assessing students in their IT risk analysis skills. It is not intended to represent any actual company or industry.
Scenario
Well Done, you have just gained your first post as an IT Risk Analysis after completed your degree at the University of Wolverhampton. You have been a appointment by Wolves Techs Limited to be a professional consultant to provide support and recommendations regarding the risks and requirements associated with their IT/IS systems.
Essential Information
The company “Wolves Techs Limited” have been trading for 3 years based in a converted barn. The main business of the company is processing data for major retailers to provide detailed analysis of customer spend on products and services. Currently run by a Director with 2 staff. Increased turnover and demand for reports has resulted in a requirement to move to new premises with additional staffing of 4 new people. They have sought a location more suitable for data processing than their present rural location that currently has limited broadband width and less opportunity for staff to commute.
They have acquired a 2 storey office just off of the ring-road of a major town. This is currently an empty shell in a 1930s building.
A basic layout of the offices has been detailed (see plans below) and the company recognize that with the nature of their work, much needs to be done to ensure security of IT and the data it processes.
Your task is to carry out an IT Risk Assessment for the company providing a detailed report of your analysis and recommendations to address those risks as set out in the assignment above.
Interior:
Ground Floor Plans
Interior: First Floor Plans
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂
Compelling correspondence is essential to the achievement all things considered but since of the changing idea of the present working environments, successful correspondence turns out to be more troublesome, and because of the numerous impediments that will permit beneficiaries to acknowledge the plan of the sender It is restricted. Misguided judgments.In spite of the fact that correspondence inside the association is rarely completely open, numerous straightforward arrangements can be executed to advance the effect of these hindrances.
Concerning specific contextual analysis, two significant correspondence standards, correspondence channel determination and commotion are self-evident. This course presents the standards of correspondence, the act of general correspondence, and different speculations to all the more likely comprehend the correspondence exchanges experienced in regular daily existence. The standards and practices that you learn in this course give the premise to additionally learning and correspondence.
This course starts with an outline of the correspondence cycle, the method of reasoning and hypothesis. In resulting modules of the course, we will look at explicit use of relational connections in close to home and expert life. These incorporate relational correspondence, bunch correspondence and dynamic, authoritative correspondence in the work environment or relational correspondence. Rule of Business Communication In request to make correspondence viable, it is important to follow a few rules and standards. Seven of them are fundamental and applicable, and these are clear, finished, brief, obliging, right, thought to be, concrete. These standards are frequently called 7C for business correspondence. The subtleties of these correspondence standards are examined underneath: Politeness Principle: When conveying, we should build up a cordial relationship with every individual who sends data to us.
To be inviting and polite is indistinguishable, and politeness requires an insightful and amicable activity against others. Axioms are notable that gracious “pay of graciousness is the main thing to win everything”. Correspondence staff ought to consistently remember this. The accompanying standards may assist with improving courtesy:Preliminary considering correspondence with family All glad families have the mystery of progress. This achievement originates from a strong establishment of closeness and closeness. Indeed, through private correspondence these cozy family connections become all the more intently. Correspondence is the foundation of different affiliations, building solid partners of obedient devotion, improving family way of life, and assisting with accomplishing satisfaction (Gosche, p. 1). In any case, so as to keep up an amicable relationship, a few families experienced tumultuous encounters. Correspondence in the family is an intricate and alluring marvel. Correspondence between families isn’t restricted to single messages between families or verbal correspondence.
It is a unique cycle that oversees force, closeness and limits, cohesiveness and flexibility of route frameworks, and makes pictures, topics, stories, ceremonies, rules, jobs, making implications, making a feeling of family life An intelligent cycle that makes a model. This model has passed ages. Notwithstanding the view as a family and family automatic framework, one of the greatest exploration establishments in between family correspondence centers around a family correspondence model. Family correspondence model (FCP) hypothesis clarifies why families impart in their own specific manner dependent on one another ‘s psychological direction. Early FCP research established in media research is keen on how families handle broad communications data. Family correspondence was perceived as an exceptional scholastic exploration field by the National Communications Association in 1989. Family correspondence researchers were at first impacted by family research, social brain science, and relational hypothesis, before long built up the hypothesis and began research in a family framework zeroed in on a significant job. Until 2001, the primary issue of the Family Communication Research Journal, Family Communication Magazine, was given. Family correspondence is more than the field of correspondence analysts in the family. Examination on family correspondence is normally done by individuals in brain science, humanism, and family research, to give some examples models. However, as the popular family correspondence researcher Leslie Baxter stated, it is the focal point of this intelligent semantic creation measure making the grant of family correspondence special. In the field of in-home correspondence, correspondence is normally not founded on autonomous messages from one sender to one beneficiary, yet dependent on the dynamic interdependency of data shared among families It is conceptualized. The focal point of this methodology is on the shared trait of semantic development inside family frameworks. As such, producing doesn’t happen in vacuum, however it happens in a wide scope of ages and social exchange.
Standards are rules end up being followed when performing work to agree to a given objective. Hierarchical achievement relies significantly upon compelling correspondence. So as to successfully impart, it is important to follow a few standards and rules. Coming up next are rules to guarantee powerful correspondence: clearness: lucidity of data is a significant guideline of correspondence. For beneficiaries to know the message plainly, the messages ought to be sorted out in a basic language. To guarantee that beneficiaries can without much of a stretch comprehend the importance of the message, the sender needs to impart unmistakably and unhesitatingly so the beneficiary can plainly and unquestionably comprehend the data.>