1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
3 years ago
15

There are several steps in Information Risks planning. How can you utilize these steps to create a "Security Data Policy for emp

loyees storing personal data on their work computers." Describe how you will use each step. Will you need to use all the steps, if not what steps would be eliminated and why
Social Studies
1 answer:
Mariana [72]3 years ago
5 0

Answer: among the many steps in information risk planning, below are the 5 basic steps:

• STEP 1: Identify the risk

• STEP 2: Analyze the risk

• STEP 3: Evaluate or rank the risk

• STEP 4: Treat the risk

• STEP 5: Monitor the risk.

I WILL NOT CONSIDER STEP THREE, BECAUSE I SEE ALL RISK TO BE THE SAME, THE ONE YOU ASSUME TO BE A HIGH RISK MAY NEVER OCCUR, WHILE THE ONE YOU ASSUME TO BE A LOW RISK MAY OCCUR FREQUENTLY. SO I WILL GIVE EQUAL ATTENTION TO ALL RISK IDENTIFIED.

In using this steps I have to take is orderly.

FIRST STEP: identifying the risk, in this first step I will have to identify all the risk that are involved in information security, which could be data lost from a computer or data theft from a personal computer.

SECOND STEP: Analyse the risk. I will study easy risk, how can data be stolen from an employee personal work computer, and how can data be lost from an employee work computer. To analyze this risk, data can be lost from an employee computer, if the system has been corrupted by a virus, if the system hard disc crash, if the system was mistakenly formated, and if the system is poorly maintained. Data can be stolen from a system if the system is been hacked, if the system has no password, and by stealing the hard disc in the system.

THIRD STEP: Evaluate or rank the risk. This is where you evaluate each risk, to know the high risk and the low risk, and to know the level of precaution to be used. I will not consider this step because I believe all risk are high and anyone can occurs any day, so the chance of all risk is the same, and the level of precaution to be taken in all risk should be the same.

FOURTH STEP: Treat the risk. In this step I will treat all the risk I discovered in the second step. For data security in terms of theft, special security code will be generated for all employee computer, which will be known only by the employee who use the computer. All staff are meant to leave the office when working hours is over, or work with the security personnel if the staff works overtime, to avoid theft of hard disc. Staffs will be educated to avoid clicking links from an unknown source, to avoid been hacked. For data security in terms of lost. All staff will back up their files in a cloud. All staff will be educated on the usage of computers to avoid formating the system by mistake. They will be an updated anti virus, to quarantine the system from virus, which can damage data.

FIFTH STEP: Monitor and review the risk. The risk will be monitored constantly, by updating virus always, changing of password to each system at least once in a month, monitoring each staff usage of the computer, updating the IT unit with recent technologies and softwares, updating the security on their duties. As the risk is been monitored, I will watch out for more risk to be identified.

You might be interested in
Beginning sometime in high school, Bernie lost his way. He failed to find his niche and drifted into an aimless life of odd jobs
Ivenika [448]

Answer:

Role confusion

Explanation:

Role confusion is related to adolescence and teenage years. They get confused if they are unable to achieve something or face various kinds of scenarios.

In this question, Berney failed to find his niche and drifted into an aimless life of odd jobs and drug use.

In Erikson's terms, Bernie failed to solve the identity versus <u>Role confusion </u>crisis.

4 0
3 years ago
WHAT IS COMMON LAW AND WHY IS IT CALLED COMMON LAW?!? SOMEONE HELP ME PLEASE
nydimaria [60]

Common law is a law that established by court decision rather than by statues enacted by legislature .


Common law called like that because it was intended to be applied uniformly and therefore be coming among the courts of the various jurisdictions in England .


I hope that's help ! 

8 0
3 years ago
An explanation of the government system in guatemala
Olin [163]
Guatemala is a constitutional democratic Republic divided into 22 departments and governed by 3 branch systems ( executive, legislative, and judicial)
3 0
3 years ago
What problems do farm labourers face in terms of employment ? explain any three
Sergio [31]
Here are three problems that farm laborers face in terms of their work.
Firstly, some farm laborers do not have right over the crops that they have grown, sometimes their land owners takes the produce and gives them wages, sometimes their is a 50/50 share between the laborers and the owner. Secondly, their wages vary from the crops they grow and from different regions, laborers have different wages in different regions, sometimes there are more economically high regions, which pay more than the others. Lastly, the farm laborers do not have their own land to grow crops, they rent or borrow land from a land owner and creates a deal with the land owner with regards to the crops.
3 0
3 years ago
The legislative branch has the power to declare was against foreign country’s
Fudgin [204]

Answer:

yes.

Explanation:

3 0
2 years ago
Read 2 more answers
Other questions:
  • It was mark’s first day at his new school. He felt a bit nervous as he watched the groups of students chatting while they waited
    9·2 answers
  • Which option best describes the role of citizens in a democracy?
    15·2 answers
  • Most people in Europe identify themselves as being part of what religion? A) Christianity B) Hinduism C) Islam D) Judaism
    13·1 answer
  • Jason is buying a new car. He does not really know
    13·1 answer
  • I like 3 boys at the same time and they are all the best of friends. I don't know who I like more. My best friends ask why I lik
    8·1 answer
  • A speaker converts electricity to sound. In this case, is electrical energy the<br> input or output?
    5·1 answer
  • Help me with this question please I’m having troubles with it
    5·2 answers
  • 1. What<br> were some of the major<br> achievements of Suleyman I?
    15·1 answer
  • To learn your first speech well enough to deliver it extemporaneously, you need to practice it to learn your first speech well e
    5·2 answers
  • Completed budget(from lesson 11.01), to include GMI (Gross Monthly Income), completed budget with deductions, NMI (Net Monthly I
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!