Sign In
Not register? Register Now!
Pages:
3 pages/≈825 words
Sources:
4 Sources
Style:
MLA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 21.87
Topic:

Information Systems Security Risk Assessment

Research Paper Instructions:

Brief Overview:
In order to successfully manage risk, one must understand risk itself and the assets at risk. The way one goes about managing risk will depend on what needs to be protected, and from what to protect it.
Instructions
Write a 3–4 page paper answering the following questions:
1.) Discuss at least three rationales for performing an information systems security risk assessment.
Helpful Note: (Thoroughly discusses at least three rationales for performing an information systems security risk assessment)
2.) Explain the differences in quantitative, qualitative, and hybrid information systems risk assessment and illustrate the conditions under which each type is most applicable.
Helpful Note: (Thoroughly explains the differences in quantitative, qualitative, and hybrid information systems risk assessment, including the conditions under which each type is most applicable.)
3.) Describe the type of information that is collected to perform an effective information systems security risk assessment. Include at least three different types. Fully describe each and justify why you made your selections.
Helpful Note: (Thoroughly describes the type of information that is collected to perform an effective information systems security risk assessment, including at least three different types and justifications for them.)
4.) Describe at least five common tasks that should be performed in an information systems security risk assessment.
Helpful Note: (Thoroughly describes at least five common tasks that should be performed in an information systems security risk assessment.)
Additional Instructions
Use at least four quality resources in this paper. Note: Wikipedia and similar websites do not qualify as quality resources.

Research Paper Sample Content Preview:
Student’s name
Instructor
Course
Date
RISK METHODOLOGIES AND ANALYSIS
1 Rationales for performing an information systems security risk assessment
There are several advantages to evaluating the security risks of an information system. A risk assessment can help organizations identify threats and vulnerabilities lurking within their infrastructure (Blank et al., p.4). When it comes to protecting sensitive data, risk assessments may help administrators make better judgments about which data is most important to keep safe. When reducing the number of vulnerabilities exploited, the first step is to identify them. Everyone should know where they are most susceptible since it might have devastating financial effects if that weakness is controlled. It's essential to keep this in mind while doing a risk assessment. Through risk assessments, a corporation can take a moment out of their hectic schedule to seek out and highlight the weakest link in their organization's infrastructure. Identifying vulnerabilities and threats is the first step in determining the severity of the risks (Blank et al.pp 4-6). Organizations today have a better understanding of the types of attacks that are most likely to occur due to doing risk assessments. With this information, a business can take steps to lessen the impact of a risk should it happen.
Making a decision on which protections are most suitable for each identified risk is the final stage in reducing the potential harm. A risk assessment aids decision-makers by providing a cost-benefit analysis of hazards they should decrease. Investments in safeguards must also make economic sense. To protect a $12 object, you wouldn't spend $90 on a high-security lock. For enterprises, risk assessments provide insight into where they need to be safeguarded and likewise. What they must protect data and how they must defend it are the questions they must answer.
2 The differences in quantitative, qualitative, and hybrid information systems risk assessment illustrate the most applicable conditions under each type.
A quantitative risk assessment differs from a qualitative risk assessment by the very nature of the two types of assessments. Using formulas and numbers reduces risk and control analysis to a simple arithmetic problem. This strategy, however time-consuming, will connect more with non-IT decision-makers since it paints an easy-to-understand cost-benefit breakdown. A drawback to this strategy is that reliable data may not always be accessible, in the absence of accurate data; formulae may be incorrect, resulting in losses.
On the other hand, qualitative research relies on expert judgment to provide relative values. Qualitative employs probability and the impact of risk instead of verified facts based on statistics. Likelihood and influence determine which risks are most important and least necessary to the company (Mkrtchyan et al., p2). The qualitative technique employs phrases like "high," "medium," and "low" to describe the risk level. Compared to quantitative risk evaluation, qualitative analyses may be completed in a shorter time frame. A combination of quantitative and qualitative methodologies is used in hybrid methods. Having the ability to draw on both data and professional a...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These MLA Research Paper Samples: