1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
4 years ago
15

There are several steps in Information Risks planning. How can you utilize these steps to create a "Security Data Policy for emp

loyees storing personal data on their work computers." Describe how you will use each step. Will you need to use all the steps, if not what steps would be eliminated and why
Social Studies
1 answer:
Mariana [72]4 years ago
5 0

Answer: among the many steps in information risk planning, below are the 5 basic steps:

• STEP 1: Identify the risk

• STEP 2: Analyze the risk

• STEP 3: Evaluate or rank the risk

• STEP 4: Treat the risk

• STEP 5: Monitor the risk.

I WILL NOT CONSIDER STEP THREE, BECAUSE I SEE ALL RISK TO BE THE SAME, THE ONE YOU ASSUME TO BE A HIGH RISK MAY NEVER OCCUR, WHILE THE ONE YOU ASSUME TO BE A LOW RISK MAY OCCUR FREQUENTLY. SO I WILL GIVE EQUAL ATTENTION TO ALL RISK IDENTIFIED.

In using this steps I have to take is orderly.

FIRST STEP: identifying the risk, in this first step I will have to identify all the risk that are involved in information security, which could be data lost from a computer or data theft from a personal computer.

SECOND STEP: Analyse the risk. I will study easy risk, how can data be stolen from an employee personal work computer, and how can data be lost from an employee work computer. To analyze this risk, data can be lost from an employee computer, if the system has been corrupted by a virus, if the system hard disc crash, if the system was mistakenly formated, and if the system is poorly maintained. Data can be stolen from a system if the system is been hacked, if the system has no password, and by stealing the hard disc in the system.

THIRD STEP: Evaluate or rank the risk. This is where you evaluate each risk, to know the high risk and the low risk, and to know the level of precaution to be used. I will not consider this step because I believe all risk are high and anyone can occurs any day, so the chance of all risk is the same, and the level of precaution to be taken in all risk should be the same.

FOURTH STEP: Treat the risk. In this step I will treat all the risk I discovered in the second step. For data security in terms of theft, special security code will be generated for all employee computer, which will be known only by the employee who use the computer. All staff are meant to leave the office when working hours is over, or work with the security personnel if the staff works overtime, to avoid theft of hard disc. Staffs will be educated to avoid clicking links from an unknown source, to avoid been hacked. For data security in terms of lost. All staff will back up their files in a cloud. All staff will be educated on the usage of computers to avoid formating the system by mistake. They will be an updated anti virus, to quarantine the system from virus, which can damage data.

FIFTH STEP: Monitor and review the risk. The risk will be monitored constantly, by updating virus always, changing of password to each system at least once in a month, monitoring each staff usage of the computer, updating the IT unit with recent technologies and softwares, updating the security on their duties. As the risk is been monitored, I will watch out for more risk to be identified.

You might be interested in
The requirements for a master’s degree in psychology generally include __________. a. four years of undergraduate work in a subf
slamgirl [31]

The Right Response is Option D which is

D) Two years of Graduate study in a subfield, practicum experience, and a Thesis.

<h3><u>What do the typical prerequisites for a master's degree in psychology consist of?</u></h3>
  • By program, requirements might differ. 30 to 40 credits are common for psychology master's programs. Students often have the option of choosing a focus in clinical, social, or organizational psychology. While some programs end with a portfolio or comprehensive test, others require a formal thesis assignment.
  • Graduate degrees in psychology that allow students to obtain specialized knowledge in a particular field of psychology are called master's degrees. Students who pursue a degree in this field will be prepared for a variety of occupations in psychology, including research, clinical counseling, school counseling, and licensed marital and family counseling.

To learn more about Degree in Psychology, click the links.

brainly.com/question/9007392

brainly.com/question/10953419

#SPJ4

8 0
2 years ago
In what part of florida did most seminoles live in 1750
REY [17]
They lived in the northwest and southern Florida
7 0
3 years ago
The behavioral and psychological traits considered appropriate for men and women.
Verdich [7]

I think it's gender. Gender role was the thing society chose for you or something. I'd go with Gender :DD

4 0
3 years ago
Read 2 more answers
Which European group made no missionary effort to convert the Native Americans?
Mazyrski [523]
The Dutch is the European group who made no missionary effort to convert the Native Americans.

Though the Dutch have the persistent desire to bring the Native Americans into the Dutch Reformed Church, no missionary effort were exercised and the Native Americans retained their independent status while showing little interest or incentive to learn the new religion.
8 0
4 years ago
Solve these if you are really following the news:
Fiesta28 [93]

Answer:

Corona Virus

Explanation:

that's the only one

6 0
3 years ago
Other questions:
  • Which of the following BEST expresses why town meetings, when they started, once exemplified direct democracy in its richest for
    9·2 answers
  • What part of the ancient world where the seven wonders of the world from​
    14·1 answer
  • How did Michelangelo's and Leonardo da Vinci's human figures represent Humanist ideals?
    8·2 answers
  • When justices agree with the ruling of a court majority but not all of its reasoning, they may often write a(n)
    14·1 answer
  • When conducting inspections of Food Establishments, the food program specialists generally focus on specific areas. Select all t
    14·1 answer
  • What (or who) influenced the development of Machiavelli’s political ideas? Raphael Humanism Pope Gregory VIII Plato
    10·2 answers
  • In an industrial research laboratory, Drs. French and Heinz are conducting an experiment on the effects of sugar on consumers' p
    7·1 answer
  • U.S. companies that operate abroad, particularly those who contract with foreign companies, are now ________ human rights and en
    14·1 answer
  • The Sunnis believed that Ali's descendants should rule Islam.<br> A.True<br> B.False
    10·1 answer
  • The idea that the government's legitimacy and power derive from the consent of the governed is known as ______.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!