Wednesday, June 19, 2019

Forensics and security report Essay Example | Topics and Well Written Essays - 1500 words

Forensics and guarantor report - Essay ExampleIt is within this backcloth therefore that this particular report intends to provide an analysis on security assessment touching on the processes involved, the key technologies used and the necessity for forensic procedures and policies.With the change magnitude dependence on the computer systems, the risk relating to information security has no doubt joined a range of risks that organizations have to manage (Landoll, 2011). Regardless of the risk type, all risk assessments normally contain the following processesDefining the Security Domain This step involves the identification of the major security areas that are deemed vulnerable to security risks or simply the identification of the risk within a chosen domain/field of interest. Risks are often about events ,as a result, their identification loafer begin with finding out their sources, which may be either internal or externalIdentifying Assets This stage involves identifying as we ll as determining the value, sensitivity, as well as the criticality of not wholly the assets but also the operations that may be affected if a given threat occursto promise the operations and even assets that are most significant. The step often involves classifying that which is significant or of value to the organization including the tangible assets such as the data touch machines/equipment, buildings and employees, as well as the intangible assets, which may include the intellectual propertyIdentifying threats This step involves detecting threats deemed to harm and, therefore, seriously affect not only the critical operations but assets as well. The threats may include things such as disgruntled employees, intruders, terrorists, criminals and even natural disasters.Identifying Vulnerabilities This entails identifying and estimating the probability that given threats may fall out by relying on past information as well as judgment of well-informed experts. This often calls fo r a

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.