100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Class notes

Class notes Collaborative Environment Process

Rating
-
Sold
-
Pages
17
Uploaded on
16-04-2021
Written in
2019/2020

These assignment provides in detail information regarding cloud policy, threat and risk assesment, disaster recovery and so on.

Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
April 16, 2021
Number of pages
17
Written in
2019/2020
Type
Class notes
Professor(s)
Doug
Contains
All classes

Subjects

Content preview

Risk-Threat Assessment 1




Table of Contents
DOCUMENT PURPOSE AND MISSION.................................................................................................2



1
INFO8930

,Risk-Threat Assessment 2



ROLES AND RESPONSIBILITIES......................................................................................................... 3
PROGRAM SCOPE AND BOUNDARIES...............................................................................................4
CRITERIA............................................................................................................................................... 5
STEPS.................................................................................................................................................... 5
1. SETUP.................................................................................................................................................6
2. DATA ELEMENT INVENTORY..................................................................................................................7
3. THREAT SEVERITY................................................................................................................................8
Frequency & Impact Definitions......................................................................................................................... 8

Frequency & Impact Weightings...................................................................................................................... 11

Risk Tolerance Level....................................................................................................................................... 12

Threat Severity Analysis.................................................................................................................................. 12

4. RISK RESPONSE.................................................................................................................................13
5. MITIGATED CONTROL MATURITY.........................................................................................................14
6. RESULTS............................................................................................................................................14
REVISION HISTORY............................................................................................................................ 16
REFERENCES...................................................................................................................................... 16




Document Purpose and Mission

This document’s purpose is to describe the procedure in which threat and risk assessments

(TRAs) could be implemented for Choco Cake. This document is used to analyze a system to

check the flaws in the system and suggests some ways to tackle those before it occurs. A

vulnerability in the system can result in a security breach and it could be accidentally triggered

by the intervention of humans.




2
INFO8930

, Risk-Threat Assessment 3



This is meant to be part of the larger risk management program for Coco Cake and will align

with the objectives and goals set out in the program.

This document will not provide good results when used individually so it is better to use with

the Threat and Risk Assessment Tool to provide repeatable results.


Roles and Responsibilities

The following individuals are responsible for carrying out threat and risk assessments. As

some individuals are always included in these kinds of assessments. This may be a Risk

Manager or Chief Information Officer. It is not necessary to have the same individuals in every

project, as it depends on the projects.

Chief Information Officer (CIO)- CIO is responsible for handling overall risk-threat

assessment and saves the organization from unacceptable cost and manages the processes

such as planning and budgeting.

Risk Manager – Risk manager job is to develop and implement such systems that help the

company to manage the risks effectively, and will improve strategy, risk management policy as

well as the framework.

Senior Management- Senior management tracks staff to ensure that functional and business

elements working are associated with risk management policy. He will also check out the

areas so that risks can be identified in the system.

Provider – Provider is responsible for carrying out IT services such as security and manages

incidents and threats in the organization. Provider also design, integrate and operate controls

in the business, and report on status regarding controls, threat and compliance.




3
INFO8930
$10.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
contactajaypal96

Get to know the seller

Seller avatar
contactajaypal96 Conestoga College Institute of Technology and Advanced Learning
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
4 year
Number of followers
1
Documents
6
Last sold
4 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions