There are many things to improve the performance of the business, which provide better outcomes. It is necessary to improve productivity and performance. In addition, security first steps to improve the functionality and processes. Moreover, risk assessment has provided help to manage issues and challenges in a firm. Most useful thing is that risk management is necessary for managing various resources of a firm. Privacy is the first concern in big data (Cuzzocrea, 2014). There are various benefits of risk assessment in an organization. This report will discuss about the importance of risk assessment in a firm and its procedure. It will use the ISO 31000 standard for risk analysis. In this report, security policies will develop based on the risks of business functions. In the end, recommendations will provide for an organization.
There are various types of risks to the IT assets of a company. It has depended on the vulnerabilities of a company, which has exploited by threats, such as malware, viruses, phishing, and many others. In addition, the company should take care about their vulnerabilities and threats. Moreover, there are some basic risks, which can affect the IT security of the company, which areas:
Malicious programs can affect an organization, which is not good for an organization. In addition, hackers have selected particular programs to access the network or systems of an organization. They can access the databases of an organization, which is a huge issue in front of their image.
Hackers have denied most of the services of a firm using malicious codes, such as computer systems, networks, servers, and more. It has created chaos in front of a firm, as the company has stored personal details of their employees and customers, which is confidential and sensitive. Thus, the company should adopt firewalls and intrusion detection systems to avoid DDoS attacks. The DDoS attack makes a huge impact on the services of a firm, as it has blocked all the services of a firm, which has affected its internal and external processes. Moreover, a firm can use a security management system to avoid such types of attacks, which are not good for the company as well.
Data breaches are common issues in most of the organization, which is not good for their customers as well as the company. Customers have provided their personal details to the company, such as name, address, email, credit card number, and many others. Therefore, the company should protect the data and information of customers as well as the company using proper resources.
Source: Publicly available numbers from Javelin Strategy & Research
It is the most critical thing for a firm, which has created a critical condition in front of a firm, which is a virus. It is a program, which can damage the data and information of a firm, which is usable and meaningful for the company. Thus, the company should use proper antivirus software to avoid such types of issues.
It is different types of IT security risks in which hackers have created a program to take personal information of users or employees to take access to their main systems, such as date of birth, name, mobile number, and many others. Thus, the company should provide training to its employees about their roles and responsibility for IT security. Furthermore, security processes have used monitoring systems, which have analyzed various processes of a firm.
Source: (Norton, 2018)
VPN is separated from the DMZ, as it has included private connection between internal resources of a firm. It will be beneficial for internal programs. Most of the zones have used private connection for the company as well as other peoples. VPN is a good solution for solving risks from cyber-attacks. In addition, DMZ can provide a private sector to secure all the components of a network. Moreover, many companies have used DMZ and VPN for security purposes. Most of the processes have secured using firewalls, DMZ, VPN, and many other procedures and techniques. However, hackers have used new programs to break the security of a system using their vulnerabilities.
Source: (Leiniö, 2015)
DMZ has secured all the internal resources from external risks and threats. It is the best way to make a connection secure in a company.
Source: author
Internet is available for the company, which is necessary for managing all the external and internal communication skills. It is necessary to implement firewall and DMZ zone for security of servers and systems. The company can setup different setup of servers, which are necessary for managing different domains, such as mail server, MySQL server, and DNS. Moreover, internal network can be used firewall for securing connection from outside as well.
Data protection is necessary for managing all the things in a better way. Thus, it is necessary to implement regulations for data protection. Third-party devices cannot allow on the premises without proper checking. In addition, an audit is necessary for managing all the things. Most of the risks have generated because of vulnerabilities in the system of a firm. Moreover, companies have ignored the basic functions of security, which is a reason for IT security risks. Vulnerabilities are the reason for threats. Thus, a firm should reduce their vulnerabilities using various methods, such as audit and security frameworks. There are various security frameworks, which have provided security to the system from various threats. ISO 27001 has provided guidelines for audit and monitoring of most of the IT assets (Cobb, 2010). The Data Protection Act 2018 is the UK’s implementation of the General Data Protection Regulation (GDPR). The Data Protection Act 2018 controls how your personal information is used by organisations, businesses or the government.
Risk is a business concept, which makes the likelihood of financial losses in different levels, such as low, high, medium. There are three main factors in business. It provides help to calculate risk in a particular sector, which is an asset, threat, and vulnerability (Datameer, 2018). There are some basic financial damages because of risks, which are data loss, legal consequences, and system downtime. There is some basic step for risk assessment, which has provided control to all the risk of assets and other things. These are steps, which areas:
Source: (James, 2019)
Source: Author
All the factors can be managed using proper actions based on various things. It provides growth and success to the organization.
It is an international standard for risk assessment and management. In addition, there are many benefits to this standard to manage all the risks of an organization. There are many benefits of mitigation strategies, which has provided by the Australian government (ACSC, 2019). Most of the standards have included different things to secure all the IT assets. In addition, many changes have occurred in malicious programs. Thus, it is necessary to update the rules and reregulation (Purdy, 2010).
Source: (Purdy, 2010)
Most of the risks can be identified using audit and analysis. Therefore, a particular standard has created for the evaluation of vulnerabilities (Rittinghouse & Ransome, 2016). The focus of this standard is based on four things, which are reliability and consistency. It has included these things, which areas:
In addition, data security is a huge issue in front of most of the technologies, which can be managed using various things (Chen & Zhao, 2012). Many organizations have ignored this standard because of cost and time. However, data breaches have imposed large amounts of financial losses for the organization. Thus, it is the basic need of an organization to manage all the things. Moreover, ISO 31000 has used for risk treatment, which is good for an organization. In addition, there are some basic advantages of an international framework to improve the quality of security. Many firms have faced cyber-attacks because of the poor security of IT assets.
Security policies are necessary for managing risks and controlling them. In addition, the Australian government has provided a basic code of ethics to manage IT assets (ACSC, 2017). A firm should consider the importance of IT security policies to reduces challenges and avoid issues in its business functions, which are related to IT systems (Sotnikov, 2018).
Many organizations have implemented international standards to avoid risks in their business operations. An international standard of risk management has designed to audit all the assets of the firm, which has used for the creation of controls (Stttech, 2019). It is necessary to improve the business processes to make secure all the data from both ends (Blakstad & Andreassen, 2016).
Moreover, the organization has used different types of security policies, which are helpful to manage risks and threats for their IT assets (Warren, 2011). Besides, it is necessary to improve the outcomes of various processes. In addition, many problems can be solved using rules and regulations. It has created for the prevention and avoidance of threats (Whitman & Mattord, 2011). Threats have exploited vulnerabilities of the system to access the data and controls. Thus, it is necessary to improve the basic services using IT security policies. In addition, cloud computing is helpful in the management of security risks (Bird, 2018). IT security policy has based on differ internal policies for security, which must be implemented in an organization, which areas:
There are many other security policies in international standards, which can be managed using basic services. Most of the important security policy is access control. Moreover, cyber-attacks have increased day by day, which is a huge issue in front of the organization (Bendovschi, 2015).
An audit has analyzed most of the vulnerabilities of a system using tools and techniques. It has depended on the basic services of an organization (Zhou, et al., 2017). In addition, security can be improved based on the audit and monitoring of different suspicious processes. It can manage most of the things in a better way (Zhang, et al., 2010). There are many security systems available in the market, which provides proper protection from threats. Most of the firms have ignored the basic risks of IT assets, which can damage data and information (Beaver, 2013).
Source: (Svantesson & Clarke, 2010)
Moreover, an audit is a good option to analyze various processes. Therefore, the security team can create controls for those vulnerabilities. However, there are many intrusion protection systems are presented in the market. In addition, the firewall is the best option for security, as well as there, are other options in the market to monitor suspicions activities. A honeynet is a new concept to know about the attacks on the system. Security is a huge challenge in front of a human. Thus, it is necessary to increase knowledge about cyber-attacks (Ashenden, 2008). Many organizations can use third parties to secure all IT assets from cyber-attacks.
It is the best way for business continuity after any type of disaster, such as earthquakes, floods, and many others. A firm should implement a disaster recovery plan, which is a good way to reduce the losses of a firm. It is a part of security as well. Backup and recovery are a basic need in the present era.
Source: Author
Apart from it, IT security policies have evaluated based on penetration tools and techniques. It will improve their guidelines for users. Employees have made mistakes because of a lack of knowledge, which is harmful to a firm, such as social engineering, phishing, and many others. There are various threats, which have identified vulnerabilities of a system to damage their security.
Source: Author
There are three types of disasters, as mention in the above diagram, which is natural, technological, human. In addition, a disaster recovery plan can reduce losses from these disasters (Edwards, 2017).
Source: Author
There are many ways to evaluate IT security policies. Ethical hackers have used different types of techniques to monitor all the things to secure the whole system. In addition, server-monitoring tools have used to identify suspicious activities, which can damage data and other things in the system. Moreover, there are various things to evaluate security policies based on IT assets. Those assets can be analyzed using different testing tools. There are many data mining tools to evaluate security policies (Tipton & Nozaki, 2007). Most of the threats can be managed using security policies. However, attackers have used different types of programs to access the databases.
Moreover, IT security policies have included most of the parts of security management in an organization. In addition, most of the systems can be evaluate using proper standards, such as ISO 27001, 31000, and many others. Cybersecurity is necessary for managing all the things in a good manner (Arlitsch & Edelman, 2014). Besides, IT security policies have provided various solutions for particular problems. Moreover, there are some basic concepts to manage risks using policies and regulations. Furthermore, IT risks can be managed using controls, which are based on the ranking of risks. In addition, most of the people have less knowledge about cybercrimes and cyber-attacks. Thus, knowledge development is necessary for them. Many organizations can provide guides and security manuals to secure all the things (Soomro, et al., 2016).
There are many things to manage using IT security policies. In addition, there are some recommendations for an organization to secure IT assets from different types of assets. These are the recommendations that must be followed by an organization, which areas:
All these recommendations must follow by an organization to secure their IT assets from different types of threats. Most of the things can be managed using IT security policies and the rest of them have handled using legal procedures.
Conclusion
In conclusion, there are many benefits of risk assessment in an organization. In addition, audit and monitoring have used to identify risks of an organization, which can be damaged large amounts of data and IT assets, which makes a huge impact on the financial condition of an organization. This report has provided a deep analysis of IT security policies. It has explained about the procedure of IT risk assessment with their steps. Moreover, it has provided details of the ISO 31000 standard, which is helpful in the risk assessment. In this report, the impacts of the audit have discussed in detail, which is necessary for the identification of threats. Finally, IT risk assessment has used for the identification of the different types of risk with IT assets and their controls. It will provide better outcomes for an organization. It will secure from different types of cyber-attacks and cybercrime. A firm can manage their IT assets using knowledge and policies, which is good for the employees and company.
References
ACSC, 2017. Australian Cyber Security Centre. [Online] Available at: https://www.acsc.gov.au/publications/ACSC_Threat_Report_2017.pdf[Accessed 12 December 2018].
ACSC, 2019. Strategies to Mitigate Cyber Security Incidents. [Online] Available at: https://acsc.gov.au/infosec/mitigationstrategies.htm[Accessed 3 September 2019].
Arlitsch, K. & Edelman, A., 2014. Staying safe: Cyber security for people and organizations. Journal of Library Administration, 54(1), pp. 46-56.
Ashenden, D., 2008. Information Security management: A human challenge?. Information security technical report, 13(4), pp. 195-201.
Beaver, K., 2013. Top 5 Common Network Security Vulnerabilities that Are Often Overlooked. [Online] Available at: https://www.acunetix.com/blog/articles/the-top-5-network-security-vulnerabilities/[Accessed 25 November 2019].
Bendovschi, A., 2015. Cyber-attacks–trends, patterns and security countermeasures. Procedia Economics and Finance, Volume 28, pp. 24-31.
Bird, D. A., 2018. Information Security risk considerations for the processing of IoT sourced data in the Public Cloud.
Blakstad, K. . M. & Andreassen, M., 2016. Security in Cloud Computing: A Security Assessment of Cloud Computing Providers for an Online Receipt Storage. [Online]
Available at: https://brage.bibsys.no/xmlui/handle/11250/253189[Accessed 21 February 2019].
Chen, D. & Zhao, H., 2012. Data security and privacy protection issues in cloud computing. International Conference on Computer Science and Electronics Engineering, 1(1), pp. 647-651.
Cobb, M., 2010. ISO 27001 SoA: Creating an information security policy document. [Online] Available at: https://www.computerweekly.com/tip/ISO-27001-SoA-Creating-an-information-security-policy-document[Accessed 25 November 2019].
Cuzzocrea, A., 2014. Privacy and security of big data: current challenges and future research perspectives.. Shanghai, ACM, pp. 45-47.
Datameer, 2018. Challenges to Cyber Security & How Big Data Analytics Can Help. [Online] Available at: https://www.datameer.com/blog/challenges-to-cyber-security-and-how-big-data-analytics-can-help/[Accessed 3 May 2019].
Dunham, . R., 2018. Information Security Policies: Why They Are Important To Your Organization. [Online] Available at: https://linfordco.com/blog/information-security-policies/[Accessed 12 March 2019].
Dutton, J., 2017. three-pillars-of-cyber-security. [Online] Available at: https://www.itgovernance.co.uk/blog/three-pillars-of-cyber-security
Edwards, J., 2017. Disaster recovery vs. security recovery plans: Why you need separate strategies. [Online] Available at: https://www.csoonline.com/article/3218083/disaster-recovery-vs-security-recovery-plans-why-you-need-separate-strategies.html[Accessed 28 January 2020].
Hayslip, . G., 2018. 9 policies and procedures you need to know about if you’re starting a new security program. [Online] Available at: https://www.csoonline.com/article/3263738/9-policies-and-procedures-you-need-to-know-about-if-youre-starting-a-new-security-program.html[Accessed 26 November 2019].
Humphreys, E., 2008. Information security management standards: Compliance, governance and risk management. information security technical report, 13(4), pp. 247-255.
Irwin, L., 2019. 5 information security policies your organisation must have. [Online] Available at: https://www.itgovernance.co.uk/blog/5-information-security-policies-your-organisation-must-have[Accessed 26 November 2019].
James, P., 2019. Information Security Risks That You Need to Careful With Vendors/3rd Parties. [Online] Available at: https://gbhackers.com/information-security-risks/[Accessed 25 November 2019].
Kshetri, . N., 2013. Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4-5), pp. 372-386.
Leiniö, M., 2015. SoftEther VPN with a VPN Address Pool. [Online] Available at: https://majornetwork.net/2015/05/softether-vpn-with-a-vpn-address-pool/[Accessed 28 January 2020].
Lopez , D., 2013. Data security. Data Science Journal, 10 08, 12(1), pp. 69-74.
Magid , L., 2013. Online Privacy and Security is a Shared Responsibility: Government, Industry and You. [Online] Available at: https://www.forbes.com/sites/larrymagid/2013/02/12/online-privacy-and-security-is-a-shared-responsibility-government-industry-and-you/[Accessed 18 May 2019].
Norton, 2018. 10 cyber security facts and statistics for 2018. [Online] Available at: https://us.norton.com/internetsecurity-emerging-threats-10-facts-about-todays-cybersecurity-landscape-that-you-should-know.html[Accessed 28 January 2020].
Palmer, D., 2018. Cyber security: Hackers step out of the shadows with bigger, bolder attacks. [Online] Available at: https://www.zdnet.com/article/cyber-security-hackers-step-out-of-the-shadows-with-bigger-bolder-attacks/[Accessed 14 June 2019].
Paquet, C., 2013. Network Security Concepts and Policies. [Online] Available at: https://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3[Accessed 2 november 2019].
Pearson, . S., 2013. Privacy, security and trust in cloud computing. In Privacy and Security for Cloud Computing. 1 ed. London: Springer.
Peltier, T. R., 2016. Information Security Policies, Procedures, and Standards: guidelines for effective information security management. s.l.:Auerbach Publications.
Purdy, G., 2010. ISO 31000:2009 – setting a new standard for risk management. [Online] Available at: https://broadleaf.com.au/resource-material/iso-31000-2009-setting-a-new-standard-for-risk-management/[Accessed 25 November 2019].
Rittinghouse, J. W. & Ransome, J. F., 2016. Cloud computing: implementation, management, and security. Florida: CRC press.
Rouse, M., 2018. physical security. [Online] Available at: https://searchsecurity.techtarget.com/definition/physical-securityRouse, M., 2019. cybersecurity. [Online]
Available at: https://searchsecurity.techtarget.com/definition/cybersecurity[Accessed 15 August 2019].
Sanchez, M., 2010. The 10 most common security threats explained. [Online] Available at: https://blogs.cisco.com/smallbusiness/the-10-most-common-security-threats-explained[Accessed 12 December 2018].
Security-trails, 2018. Top 10 Common Network Security Threats Explained. [Online] Available at: https://securitytrails.com/blog/top-10-common-network-security-threats-explained
Sen, J., 2014. Security and privacy issues in cloud computing.. In: In Architectures and protocols for secure information technology infrastructures. USA: IGI Global, pp. 1-45.
Soomro, Z. A., Shah, M. H. & Ahmed, J., 2016. Information security management needs more holistic approach: A literature review. International Journal of Information Management, pp. 215-225.
Sotnikov, I., 2018. How to Perform IT Risk Assessment. [Online] Available at: https://blog.netwrix.com/2018/01/16/how-to-perform-it-risk-assessment/[Accessed 25 November 2019].
Stttech, 2019. Integrated Security Management System (ISMS). [Online] Available at: https://stttech.com.my/integrated-security-management-system-isms/[Accessed 14 July 2019].
Svantesson, D. & Clarke, R., 2010. Privacy and consumer risks in cloud computing.. Computer law & security review, 26(4), pp. 391-397.
Tipton, H. F. & Nozaki, M. K., 2007. Information security management handbook. New jersy : CRC press.
Warren, E., 2011. Legal, Ethical, and Professional Issues in Information Security. [Online] Available at: https://www.cengage.com/resource_uploads/downloads/1111138214_259148.pdf
Whitman, M. E. & Mattord, H. J., 2011. Principles of information security. 1 ed. London: Cengage Learning..
Zhang, X., Wuwong, N., Li, H. & Zhang, X., 2010. Information security risk management framework for the cloud computing environments.. s.l., IEEE, pp. 1328-1334.
Zhou, J., Cao, Z., Dong, X. & Vasilakos, A. . V., 2017. Security and privacy for cloud-based IoT: challenges.. IEEE Communications Magazine, 55(1), pp. 26-33.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download