100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
College aantekeningen

Class notes Collaborative Environment Process (INFO8930)

Beoordeling
-
Verkocht
1
Pagina's
17
Geüpload op
16-04-2021
Geschreven in
2020/2021

These documents are from Conestoga college. It gives in detail information regarding cloud policy, threat and risk assesment, IT outage and maintenance, disaster recovery plan and auditing in organisation.

Instelling
Vak










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Studie
Vak

Documentinformatie

Geüpload op
16 april 2021
Aantal pagina's
17
Geschreven in
2020/2021
Type
College aantekeningen
Docent(en)
Doug
Bevat
Alle colleges

Onderwerpen

Voorbeeld van de inhoud

Risk-Threat Assessment 1




Table of Contents
DOCUMENT PURPOSE AND MISSION.................................................................................................2



1
INFO8930

,Risk-Threat Assessment 2



ROLES AND RESPONSIBILITIES......................................................................................................... 3
PROGRAM SCOPE AND BOUNDARIES...............................................................................................4
CRITERIA............................................................................................................................................... 5
STEPS.................................................................................................................................................... 5
1. SETUP.................................................................................................................................................6
2. DATA ELEMENT INVENTORY..................................................................................................................7
3. THREAT SEVERITY................................................................................................................................8
Frequency & Impact Definitions......................................................................................................................... 8

Frequency & Impact Weightings...................................................................................................................... 11

Risk Tolerance Level....................................................................................................................................... 12

Threat Severity Analysis.................................................................................................................................. 12

4. RISK RESPONSE.................................................................................................................................13
5. MITIGATED CONTROL MATURITY.........................................................................................................14
6. RESULTS............................................................................................................................................14
REVISION HISTORY............................................................................................................................ 16
REFERENCES...................................................................................................................................... 16




Document Purpose and Mission

This document’s purpose is to describe the procedure in which threat and risk assessments

(TRAs) could be implemented for Choco Cake. This document is used to analyze a system to

check the flaws in the system and suggests some ways to tackle those before it occurs. A

vulnerability in the system can result in a security breach and it could be accidentally triggered

by the intervention of humans.




2
INFO8930

, Risk-Threat Assessment 3



This is meant to be part of the larger risk management program for Coco Cake and will align

with the objectives and goals set out in the program.

This document will not provide good results when used individually so it is better to use with

the Threat and Risk Assessment Tool to provide repeatable results.


Roles and Responsibilities

The following individuals are responsible for carrying out threat and risk assessments. As

some individuals are always included in these kinds of assessments. This may be a Risk

Manager or Chief Information Officer. It is not necessary to have the same individuals in every

project, as it depends on the projects.

Chief Information Officer (CIO)- CIO is responsible for handling overall risk-threat

assessment and saves the organization from unacceptable cost and manages the processes

such as planning and budgeting.

Risk Manager – Risk manager job is to develop and implement such systems that help the

company to manage the risks effectively, and will improve strategy, risk management policy as

well as the framework.

Senior Management- Senior management tracks staff to ensure that functional and business

elements working are associated with risk management policy. He will also check out the

areas so that risks can be identified in the system.

Provider – Provider is responsible for carrying out IT services such as security and manages

incidents and threats in the organization. Provider also design, integrate and operate controls

in the business, and report on status regarding controls, threat and compliance.




3
INFO8930
$8.99
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
contactajaypal96

Maak kennis met de verkoper

Seller avatar
contactajaypal96 Conestoga College Institute of Technology and Advanced Learning
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1
Lid sinds
4 jaar
Aantal volgers
1
Documenten
6
Laatst verkocht
4 jaar geleden

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen