Thursday, November 21, 2019
Forensics and security report Essay Example | Topics and Well Written Essays - 1500 words
Forensics and security report - Essay Example It is within this background therefore that this particular report intends to provide an analysis on security assessment touching on the processes involved, the key technologies used and the necessity for forensic procedures and policies. With the increased dependence on the computer systems, the risk relating to information security has no doubt joined a range of risks that organizations have to manage (Landoll, 2011). Regardless of the risk type, all risk assessments normally contain the following processes: Defining the Security Domain: This step involves the identification of the major security areas that are deemed vulnerable to security risks or simply the identification of the risk within a chosen domain/field of interest. Risks are often about events ,as a result, their identification can begin with finding out their sources, which may be either internal or external Identifying Assets: This stage involves identifying as well as determining the value, sensitivity, as well as the criticality of not only the assets but also the operations that may be affected if a given threat occursto ascertain the operations and even assets that are most significant. The step often involves classifying that which is significant or of value to the organization including the tangible assets such as the data processing machines/equipment, buildings and employees, as well as the intangible assets, which may include the intellectual property Identifying threats: This step involves detecting threats deemed to harm and, therefore, seriously affect not only the critical operations but assets as well. The threats may include things such as disgruntled employees, intruders, terrorists, criminals and even natural disasters. Identifying Vulnerabilities: This entails identifying and estimating the probability that given threats may materialize by relying on past information as well as judgment of well-informed experts. This often calls for a
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.