Answer To: You are a senior information technology analyst at your company. Your company has 250 employees....
Robert answered on Dec 25 2021
Running Head: Risk Methodology 1
Risk Methodology
Submitted By
Professor
Course
Risk Methodology 2
Abstract
This paper compares a set of techniques that permit an association to measure their data security
risk. The fundamental reason for the review is to analyze and clear up the diverse exercises, input
as well as output required by every risk assessment technique. The subsequent data helps
assessing the models' relevance to an association and their particular requirements. With a
specific end goal to confirm and approve the conclusions taken from the hypothetical
investigation of the three last models, a reasonable experience was put into practice in the
organization. (Kiran, K.V.D., Mukkamala, S., 2013)
Risk Methodology 3
Introduction
Each association has a mission. In this advanced period, as associations utilize computerized IT
framework to prepare their data for better support of their missions, risk assessment assumes to
be main part in ensuring an association's data resources, and accordingly its central goal, from IT
risks. A viable risk assessment process is an imperative part of an effective IT security program.
The vital objective of an association's risk administration process ought to be to secure the
association as well as its ability to play out their main goal, not only its IT resources. In this way,
the risk administration process ought not be dealt with essentially as a specialized capacity
completed by the IT specialists who work and deal with the IT framework, however as a basic
administration capacity of the association. (Stoneburner, G., Goguen, A., & Feringa, A., 2002).
Risk Assessment Methods
Qualitative Method
IT risk assessment of which the primary point is assurance of likelihood of incidents interfering
the right functionality of assets, where distinguished assets are distributed to resource groups, for
which there are produced list of primary risks that could concern a given resource group, and
there is determined level of hazard for every group. This technique utilizes committed
programming Subjective, which don't work on numerical data, showing results in the form of
depictions, proposals, where risk assessment is associated with:
− Qualitative depiction of asset values, assurance of subjective scales for the recurrence of
danger event and helplessness for a given risk or:
− Description of supposed risk situations by forecast of the primary risk elements. The cases of
quantitative strategies are FMEA/FMECA.
Risk Methodology 4
Quantitative Methods
Quantitative methods are where estimation of risk value is associated with utilization of
numerical measures –...