Propose a method to assess and treat IT security risks.
Answer:
If I will be asked to propse a method to asses and treat IT security risks, this is how I will follow :
Now analysing the source of risk is important to deal with it . Internal Source here we mean is it could be an employee and external source could be any third person.
If it is a risk from an external sources then we need to protect our routers and hosts with good firewalls and anti virus softwares . Furthermore we need to filter the data to detect the risk and correct it accordingly.
If source of risk is from internal then I must say it is very difficult task to deal with because it is easy to judge the intentions of an enemy than a good friend. So it needs a well planned training and educational classes for employees to educate them importance of data and network security because sometimes the risks could happen because of their lack of knowledge.
Hope it clears :)
DEAR PLEASE DO RATE IT IF HELPS ELSE LET ME KNOW YOUR DOUBT.
THANK YOU!!!
Describe how organization will assess risks and why this method of risk assessment is appropriate for your project. Briefly describe the risk assessment process, define the scale you will use to assess the risks
Which of the following methods is used by internal security teams to assess the security of internally developed application? Active reconnaissance Pivoting White box testing persistence
While assessing the risks of material misstatement, auditors identify risks, relate risk to what could go wrong, consider the magnitude of risks, and: _________ The answer can be found in the article covered in class AS2105 Federal Security Laws definition of fact is material when .... Assess the risk of misstatements due to illegal acts. Consider the complexity of the transactions involved. Consider the likelihood that the risks could result in material misstatements. Determine materiality levels.
Differentiate between incremental and breakthrough innovation and assess the risks associated with each approach.
Consider how to assess and treat pediatric clients requiring antidepressant therapy.
how to assess and treat adult and geriatric clients requiring antidepressant therapy.
The major Technology security risks associated with the creation of an organization. Summarize the importance of the Information Security Triad.
Explain the security risks of Firewalk penetration testing in relationship to firewalls.
This question is regarding Computer Security; What do you think are some other security risks and threats that companies face and how are they overcoming and preventing these threats? PLEASE MAKE COPY PASTE AVAILABLE
Network Security Propose an appropriate network infrastructure that offers sound security practices for the existing intranet and the newly proposed expansion.