Risk Management Study
Risk management of computers involves the steps to
protecting IT systems and data that provides value to people and organizations.
This involves protecting it from any
disasters that can occur such as human error or natural disasters.
Vulnerability assessment is a way of identifying how vulnerable systems are to
an attack of any sort.
Asset identification is identifying which asset need to be
protected. I have a desktop pc so the
following I would list as items I need to protect: LCD monitor, Case, Key Board
and Mouse. Most important is the case since it’s the main item from which everything
else is dependent on and which an item that is difficult to replace. Threats may damage my computer include threat
agents such as people (Espionage, Extortion, Human Error and Theft) and natural
disasters (Fire, Flood or Earthquakes). There are also chances of hardware and
software failures and utility interruption.
Weaknesses that might expose my system to an attack include
the following: Trail version of anti-virus that will expire soon and since it’s
a trail version not all security features are enabled to protect the system.
There is a chance that an attacker might hack or steal information through the
network since the network I’m regularly connecting to isn’t that secure because
it’s a public network. Where I am
staying is also not that safe since I stay at a university accommodation here
have been many report that students laptop’s and other devices have been
stolen.
Taking all of this into account there would be a great loss
to me if any of my items are damaged (software or hardware) or stolen since and
as an IT student I really depend on these items to get my work done.
No comments:
Post a Comment