You are a senior information technology analyst at your company. Your company has 250 employees. Each employee has his or her own terminal to access the company’s network. There are also 10 wireless...

1 answer below »

You are a senior information technology analyst at your company. Your company has 250 employees. Each employee has his or her own terminal to access the company’s network. There are also 10 wireless access points to support access for portable devices.


You have been charged with the task of developing a detailed risk assessment methodology. For this assignment, you should submit a report in which you discuss various risk assessment methodologies, then adopt a methodology and strongly justify your selection.


Your well-written paper should meet the following requirements:



  • Paper length: 2-3 pages in addition to required cover and references pages.

  • Include two external references in addition to the textbook.

  • Format the entire paper according to the CSU-Global Guide to Writing and APA.



Answered Same DayDec 25, 2021

Answer To: You are a senior information technology analyst at your company. Your company has 250 employees....

Robert answered on Dec 25 2021
118 Votes
Running Head: Risk Methodology 1
Risk Methodology
Submitted By
Professor
Course
Risk Methodology 2
Abstract
This paper compares a set of techniques that permit an association to measure their data security
risk. The fundamental reason for the review is to
analyze and clear up the diverse exercises, input
as well as output required by every risk assessment technique. The subsequent data helps
assessing the models' relevance to an association and their particular requirements. With a
specific end goal to confirm and approve the conclusions taken from the hypothetical
investigation of the three last models, a reasonable experience was put into practice in the
organization. (Kiran, K.V.D., Mukkamala, S., 2013)
Risk Methodology 3
Introduction
Each association has a mission. In this advanced period, as associations utilize computerized IT
framework to prepare their data for better support of their missions, risk assessment assumes to
be main part in ensuring an association's data resources, and accordingly its central goal, from IT
risks. A viable risk assessment process is an imperative part of an effective IT security program.
The vital objective of an association's risk administration process ought to be to secure the
association as well as its ability to play out their main goal, not only its IT resources. In this way,
the risk administration process ought not be dealt with essentially as a specialized capacity
completed by the IT specialists who work and deal with the IT framework, however as a basic
administration capacity of the association. (Stoneburner, G., Goguen, A., & Feringa, A., 2002).
Risk Assessment Methods
Qualitative Method
IT risk assessment of which the primary point is assurance of likelihood of incidents interfering
the right functionality of assets, where distinguished assets are distributed to resource groups, for
which there are produced list of primary risks that could concern a given resource group, and
there is determined level of hazard for every group. This technique utilizes committed
programming Subjective, which don't work on numerical data, showing results in the form of
depictions, proposals, where risk assessment is associated with:
− Qualitative depiction of asset values, assurance of subjective scales for the recurrence of
danger event and helplessness for a given risk or:
− Description of supposed risk situations by forecast of the primary risk elements. The cases of
quantitative strategies are FMEA/FMECA.
Risk Methodology 4
Quantitative Methods
Quantitative methods are where estimation of risk value is associated with utilization of
numerical measures –...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here