Cs/502 Risk Assessment

2225 Words9 Pages
Technical Paper: Risk Assessment Latoria Wilson Dr. Glenn Hines CIS 502 9/8/13 Introduction The risk assessment of Global Finance, Inc. identified vulnerabilities in the areas of Management, Operational and Technical Security. Vulnerabilities are weaknesses that may be exploited by a threat or group of threats. These vulnerabilities can be mitigated by recommended safeguards. Safeguards are security features and controls that, when added to or included in the information technology environment, mitigate the risk associated with the operation to manageable levels. A complete discussion of the vulnerabilities and recommended safeguards are found in this report. If the safeguards recommended in this risk assessment are…show more content…
The same scenario with remote access authorization, depending on the password by itself is a risk, we can’t confirm that the right person using the password to make his remote access to our network, what if unauthorized person has the password and use it to access our network? Especially the company has no password policy. Human is an asset for the company, controls must be in place to protect human been to eliminate any law suites might cost the company a lot of money, or loosing highly qualified employees. The data center fire protection system might cause harm to employee working in that room in case of fire happen because of it’s hermetically sealed to protect the center equipment’s against fire. Shutting down the company system without any notice will create a lot of problems might affect company reputation in the market, affect their data integrity because of employee not saving their work in proper way, and affect system availability that will affect venders to access the…show more content…
The primary objective of this plan, used in conjunction with the contingency plans, is to provide reasonable assurance that a computing installation can recover from disasters, continue to process critical applications in a degraded mode, and return to a normal mode of operation within a reasonable time. A key part of disaster recovery planning is to provide for processing at an alternative site during the time that the original facility is unavailable. Contingency and emergency plans establish recovery procedures that address specific threats. These plans help prevent minor incidents from escalating into disasters. For example, a contingency plan might provide a set of procedures that defines the condition and response required to return a computing capability to nominal operation; an emergency plan might be a specific procedure for shutting down equipment in the event of a fire or for evacuating a facility in the event of an

More about Cs/502 Risk Assessment

Open Document