Monday, 22 September 2014

Risk Management Study


Risk Management Study

Risk management of computers involves the steps to protecting IT systems and data that provides value to people and organizations.  This involves protecting it from any disasters that can occur such as human error or natural disasters. Vulnerability assessment is a way of identifying how vulnerable systems are to an attack of any sort.

Asset identification is identifying which asset need to be protected.  I have a desktop pc so the following I would list as items I need to protect: LCD monitor, Case, Key Board and Mouse. Most important is the case since it’s the main item from which everything else is dependent on and which an item that is difficult to replace.  Threats may damage my computer include threat agents such as people (Espionage, Extortion, Human Error and Theft) and natural disasters (Fire, Flood or Earthquakes). There are also chances of hardware and software failures and utility interruption.
Weaknesses that might expose my system to an attack include the following: Trail version of anti-virus that will expire soon and since it’s a trail version not all security features are enabled to protect the system. There is a chance that an attacker might hack or steal information through the network since the network I’m regularly connecting to isn’t that secure because it’s a public network.  Where I am staying is also not that safe since I stay at a university accommodation here have been many report that students laptop’s and other devices have been stolen.
Taking all of this into account there would be a great loss to me if any of my items are damaged (software or hardware) or stolen since and as an IT student I really depend on these items to get my work done.

 Risks will never be reduced till a point where there is no risk. Risks can be reduced to have a small impact on a user’s system or items. My computer for example can be protected in the following ways: A lock can be placed on my door to limit the changes of the attacker having all the necessary tools to come inside my room. I can also purchase a full version of my anti-virus to try and have maximum protection over my files and the way I brows the internet.  There is not much or nothing I can do about a natural disaster since I don’t have the necessary tools to protect any of my belongings from it.

No comments:

Post a Comment