1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
3 years ago
15

There are several steps in Information Risks planning. How can you utilize these steps to create a "Security Data Policy for emp

loyees storing personal data on their work computers." Describe how you will use each step. Will you need to use all the steps, if not what steps would be eliminated and why
Social Studies
1 answer:
Mariana [72]3 years ago
5 0

Answer: among the many steps in information risk planning, below are the 5 basic steps:

• STEP 1: Identify the risk

• STEP 2: Analyze the risk

• STEP 3: Evaluate or rank the risk

• STEP 4: Treat the risk

• STEP 5: Monitor the risk.

I WILL NOT CONSIDER STEP THREE, BECAUSE I SEE ALL RISK TO BE THE SAME, THE ONE YOU ASSUME TO BE A HIGH RISK MAY NEVER OCCUR, WHILE THE ONE YOU ASSUME TO BE A LOW RISK MAY OCCUR FREQUENTLY. SO I WILL GIVE EQUAL ATTENTION TO ALL RISK IDENTIFIED.

In using this steps I have to take is orderly.

FIRST STEP: identifying the risk, in this first step I will have to identify all the risk that are involved in information security, which could be data lost from a computer or data theft from a personal computer.

SECOND STEP: Analyse the risk. I will study easy risk, how can data be stolen from an employee personal work computer, and how can data be lost from an employee work computer. To analyze this risk, data can be lost from an employee computer, if the system has been corrupted by a virus, if the system hard disc crash, if the system was mistakenly formated, and if the system is poorly maintained. Data can be stolen from a system if the system is been hacked, if the system has no password, and by stealing the hard disc in the system.

THIRD STEP: Evaluate or rank the risk. This is where you evaluate each risk, to know the high risk and the low risk, and to know the level of precaution to be used. I will not consider this step because I believe all risk are high and anyone can occurs any day, so the chance of all risk is the same, and the level of precaution to be taken in all risk should be the same.

FOURTH STEP: Treat the risk. In this step I will treat all the risk I discovered in the second step. For data security in terms of theft, special security code will be generated for all employee computer, which will be known only by the employee who use the computer. All staff are meant to leave the office when working hours is over, or work with the security personnel if the staff works overtime, to avoid theft of hard disc. Staffs will be educated to avoid clicking links from an unknown source, to avoid been hacked. For data security in terms of lost. All staff will back up their files in a cloud. All staff will be educated on the usage of computers to avoid formating the system by mistake. They will be an updated anti virus, to quarantine the system from virus, which can damage data.

FIFTH STEP: Monitor and review the risk. The risk will be monitored constantly, by updating virus always, changing of password to each system at least once in a month, monitoring each staff usage of the computer, updating the IT unit with recent technologies and softwares, updating the security on their duties. As the risk is been monitored, I will watch out for more risk to be identified.

You might be interested in
In relation to the cognitive development theory, Piaget proposed that the concrete operational stage lasts from approximately __
Simora [160]

Answer:

b) 7-11                                                  

Explanation:

Jean Piaget has proposed the cognitive development theory in which he has mentioned four different stages of an individual's life including the sensorimotor, preoperational, concrete operational, formal operational stage.

Concrete operational stage: In cognitive development theory, this is considered as the third stage and starts from the seven years of a child's age and lasts through eleven years i.e, the middle childhood period. The concrete operational stage is distinguished as the development of a child's logical thought, cognitive limitations, conservation, etc.

In the question above, the given statement signifies the age between 7-11.

4 0
3 years ago
Adherents of a particular religion whose tenets focused mostly on business practices forbade women from studying their sacred te
IRISSAK [1]

Answer: the correct answer is B The statute is the least restrictive means of advancing the state's compelling interest in ending discrimination by groups using public facilities.

Explanation:

While schools are generally not public forums, they may become a designated public forum by being held open to student groups for meetings. In that case, the First Amendment may be violated if a college restricts use of its classrooms based on the content of a student group's speech.  

To justify content-based regulation of otherwise protected speech, the government must show that the regulation is necessary to achieve a compelling state interest that cannot be satisfied by less restrictive means.  

Similarly, the right to associate for expressive purposes is not absolute. At the very least, the right may be infringed to serve a compelling government interest, unrelated to the suppression of ideas, that cannot be achieved through means significantly less restrictive of associational freedoms.  

7 0
3 years ago
8. Another word used to describe market economies is
Sonja [21]
Capitalism, command economy
4 0
3 years ago
BRAINLIEST!!!
lions [1.4K]

Answer:

d

Explanation:

4 0
4 years ago
The Kansas-Nebraska Act of 1854 allowed the people in those territories to decide on the issue of slavery for themselves. Previo
Alekssandra [29.7K]
C, The Missouri Compromise
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which numbered pair of phrases best completes this diagram of the presidential impeachment process?
    14·2 answers
  • What do Robin's parents expect him to become?
    15·2 answers
  • Please help !!!<br> thank you so muchhhhh
    12·1 answer
  • Tessa is in her bedroom with her mother. tessa's mother exclaims, "you need to get these clothes off the floor right now!" tessa
    7·1 answer
  • Supreme Court. Jim, who is a bit eccentric, says that he is fed up with the way a certain employer in his town treats employees
    12·1 answer
  • How does the idea of ethical behavior benefit the jewish community?
    10·1 answer
  • Which challenge requires cooperation among nations to solve?
    14·1 answer
  • Part A Think of all the things you do in a day. Describe three activities you do that do not require any of the six types of mem
    13·1 answer
  • Doug Radi discusses the importance of keeping communication simple. For​ example, a​ 4-page memo is better than a​ 40-page repor
    7·1 answer
  • Texas law requires all real estate license holders to give the _____ to prospective buyers, tenants, sellers, and landlords.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!