1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
3 years ago
15

There are several steps in Information Risks planning. How can you utilize these steps to create a "Security Data Policy for emp

loyees storing personal data on their work computers." Describe how you will use each step. Will you need to use all the steps, if not what steps would be eliminated and why
Social Studies
1 answer:
Mariana [72]3 years ago
5 0

Answer: among the many steps in information risk planning, below are the 5 basic steps:

• STEP 1: Identify the risk

• STEP 2: Analyze the risk

• STEP 3: Evaluate or rank the risk

• STEP 4: Treat the risk

• STEP 5: Monitor the risk.

I WILL NOT CONSIDER STEP THREE, BECAUSE I SEE ALL RISK TO BE THE SAME, THE ONE YOU ASSUME TO BE A HIGH RISK MAY NEVER OCCUR, WHILE THE ONE YOU ASSUME TO BE A LOW RISK MAY OCCUR FREQUENTLY. SO I WILL GIVE EQUAL ATTENTION TO ALL RISK IDENTIFIED.

In using this steps I have to take is orderly.

FIRST STEP: identifying the risk, in this first step I will have to identify all the risk that are involved in information security, which could be data lost from a computer or data theft from a personal computer.

SECOND STEP: Analyse the risk. I will study easy risk, how can data be stolen from an employee personal work computer, and how can data be lost from an employee work computer. To analyze this risk, data can be lost from an employee computer, if the system has been corrupted by a virus, if the system hard disc crash, if the system was mistakenly formated, and if the system is poorly maintained. Data can be stolen from a system if the system is been hacked, if the system has no password, and by stealing the hard disc in the system.

THIRD STEP: Evaluate or rank the risk. This is where you evaluate each risk, to know the high risk and the low risk, and to know the level of precaution to be used. I will not consider this step because I believe all risk are high and anyone can occurs any day, so the chance of all risk is the same, and the level of precaution to be taken in all risk should be the same.

FOURTH STEP: Treat the risk. In this step I will treat all the risk I discovered in the second step. For data security in terms of theft, special security code will be generated for all employee computer, which will be known only by the employee who use the computer. All staff are meant to leave the office when working hours is over, or work with the security personnel if the staff works overtime, to avoid theft of hard disc. Staffs will be educated to avoid clicking links from an unknown source, to avoid been hacked. For data security in terms of lost. All staff will back up their files in a cloud. All staff will be educated on the usage of computers to avoid formating the system by mistake. They will be an updated anti virus, to quarantine the system from virus, which can damage data.

FIFTH STEP: Monitor and review the risk. The risk will be monitored constantly, by updating virus always, changing of password to each system at least once in a month, monitoring each staff usage of the computer, updating the IT unit with recent technologies and softwares, updating the security on their duties. As the risk is been monitored, I will watch out for more risk to be identified.

You might be interested in
The city council is planning to construct a new wastewater treatment plant to regulate the amount of po city's lakes and streams
AfilCa [17]

Answer:

Follows are the solution to the given question:

Explanation:

In order to control the amount of pollution already sunk into the lakes and streams of the City Council intends to establish a new wastewater treatment plant. Those that are planning to build a new treatment facility in the suburbs of the city by removing a wide area on the forest owing to the heat island effect, mitigating the heat and slightly higher local temperatures.

7 0
3 years ago
I need someone to talk to​
irina [24]

Answer: a

Explanation: i bored too

7 0
3 years ago
Read 2 more answers
Sherry is in her mid-eighties and is moving to a nursing home. She is used to getting up at 5 o’clock each morning and making br
brilliants [131]

Answer:

C. Re-socialization.            

Explanation:

Re-socialization: It is defined as the process through which an individual's sense of beliefs, norms, and social values are re-structured. The process is intentionally carried out in various settings like in military boot-camps, and single-parent household through a fierce social process that takes place in a total organization.

Types of socialization:

1. Primary

2. Secondary

3. Developmental

4. Anticipatory

5. Re-socialization.

4 0
3 years ago
In an aristocracy, membership in the ranks of the privileged elite is
professor190 [17]

The social status is ascribed and the membership in the elite ranks and privileged is inherited at birth. So, the elite ranks and the privileged they get was been inherit at birth. The type of person who holds exceptional rank and privileges especially those the hereditary nobility was inherited.

6 0
4 years ago
what is federalism expected to deliver? Do you think it will end unequal development of the country?Justify. ​
svlad2 [7]

Answer:

Jcvuuhcchchcjjccujcjcuciv

7 0
3 years ago
Read 2 more answers
Other questions:
  • Choose all of the accurate statements regarding the AIDS epidemic in Africa.
    9·2 answers
  • In an age-structure pyramid, the most critical age span for women in order to determine the current fertility rate potential is
    14·1 answer
  • Someone with a growth mindset would
    5·1 answer
  • And first of the occasion and inducements thereunto; the which that I may truly unfould, I must begine at the very roote & r
    6·1 answer
  • what could be used as evidence in proving someone it was a witch? a. correctly reciting the Lord's Prayer B. moles or marks on t
    7·1 answer
  • Speaker 1: overall, i agree with the democratic party's goals. if the democrats can get control of congress, we'll be able to ma
    7·2 answers
  • Help!
    5·1 answer
  • Gina buys a piece of pottery from Woodward for her principal, Kelvin. If Woodward knows that Gina is buying the pottery on behal
    9·1 answer
  • Why did the members of congress and state delegates meet. in PA in may 1787
    5·1 answer
  • Religion subject<br> I need help on my assignment<br> * accurate answers* pls ASAP
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!