Monday, June 10, 2019

Information System Security Essay Example | Topics and Well Written Essays - 14000 words

Information System Security - Essay Example31)Computer systems thus have to be constantly available, undertake and accurate. To ensure this, adequate and effective risk management practices must be in place that is, risk management must be effectively structured into an organizations existing security model, having readily available solutions for security threats and being ever vigilant for novel security threats as they develop.The purpose of this piece of work is to identify the role of risk management as part of the security model of modern information systems. To address this objective, the researcher primarily undertook a comp review of related literature. The gained knowledge is because applied to a case study to illustrate the potential value of the area under investigation.For ensuring system security, an brass section ought to implement an efficient security model and carry out certain analyses and implementation steps. This Question will research how Risk management i s defined in the literature and of which components it consists of. In addressing risk management, the role of risk analysis is investigated as an important tool in analysing the shortcomings of an organisations security system. It will then identify the different methods available to organisations to implement a sound risk management paradigm.For the identification of the risks faced by modern information systems, the researcher determine and presented the most common risks and threats a modern information system faces today and how they have developed over time. The study investigated several external and internal risks and the technologies apply by people who pose threats. The researcher proceeds with a detailed analysis of the available technologies for risk reduction in information systems.Dutta & McCrohan (2002) assert that commercial-grade operations have always been wrought with security problems, and over the years, several ways of responding to these issues have evolved . The increasing popularity

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.