1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
3 years ago
15

There are several steps in Information Risks planning. How can you utilize these steps to create a "Security Data Policy for emp

loyees storing personal data on their work computers." Describe how you will use each step. Will you need to use all the steps, if not what steps would be eliminated and why
Social Studies
1 answer:
Mariana [72]3 years ago
5 0

Answer: among the many steps in information risk planning, below are the 5 basic steps:

• STEP 1: Identify the risk

• STEP 2: Analyze the risk

• STEP 3: Evaluate or rank the risk

• STEP 4: Treat the risk

• STEP 5: Monitor the risk.

I WILL NOT CONSIDER STEP THREE, BECAUSE I SEE ALL RISK TO BE THE SAME, THE ONE YOU ASSUME TO BE A HIGH RISK MAY NEVER OCCUR, WHILE THE ONE YOU ASSUME TO BE A LOW RISK MAY OCCUR FREQUENTLY. SO I WILL GIVE EQUAL ATTENTION TO ALL RISK IDENTIFIED.

In using this steps I have to take is orderly.

FIRST STEP: identifying the risk, in this first step I will have to identify all the risk that are involved in information security, which could be data lost from a computer or data theft from a personal computer.

SECOND STEP: Analyse the risk. I will study easy risk, how can data be stolen from an employee personal work computer, and how can data be lost from an employee work computer. To analyze this risk, data can be lost from an employee computer, if the system has been corrupted by a virus, if the system hard disc crash, if the system was mistakenly formated, and if the system is poorly maintained. Data can be stolen from a system if the system is been hacked, if the system has no password, and by stealing the hard disc in the system.

THIRD STEP: Evaluate or rank the risk. This is where you evaluate each risk, to know the high risk and the low risk, and to know the level of precaution to be used. I will not consider this step because I believe all risk are high and anyone can occurs any day, so the chance of all risk is the same, and the level of precaution to be taken in all risk should be the same.

FOURTH STEP: Treat the risk. In this step I will treat all the risk I discovered in the second step. For data security in terms of theft, special security code will be generated for all employee computer, which will be known only by the employee who use the computer. All staff are meant to leave the office when working hours is over, or work with the security personnel if the staff works overtime, to avoid theft of hard disc. Staffs will be educated to avoid clicking links from an unknown source, to avoid been hacked. For data security in terms of lost. All staff will back up their files in a cloud. All staff will be educated on the usage of computers to avoid formating the system by mistake. They will be an updated anti virus, to quarantine the system from virus, which can damage data.

FIFTH STEP: Monitor and review the risk. The risk will be monitored constantly, by updating virus always, changing of password to each system at least once in a month, monitoring each staff usage of the computer, updating the IT unit with recent technologies and softwares, updating the security on their duties. As the risk is been monitored, I will watch out for more risk to be identified.

You might be interested in
Taylor wants to support her claim that students who study abroad have greater job opportunities after college. To do this, she f
Ber [7]

Answer:linear; inductive

Explanation:

A linear worldview is a view in which one sees the world as working in certain orderly , progressive and particular way which is sequential from beginning to end.

Cyclical view on the other side views the world as uncertain

Inductive reasoning- is the reasoning in which conclusion is generalized based on observed events or situations. One collects the data and conclude from that data. It generalizes from specific situations. It doesn't follow that all premises need to be true for a conclusion to be true like in deductive reasoning , it just draws a conclusion that is is general even when not all premises are true.

Taylor is generalizing based only on the data of those who studied overseas and have got greater jobs.

7 0
3 years ago
The number of slaves in America
ipn [44]

Answer:

759,000 (60,000 free)

Explanation:

The number of enslaved and free blacks rose from 759,000 (60,000 free) in the 1790 US Census to 4,450,000 (11% free or 480,000) a 580% increase in the 1860.....

6 0
3 years ago
5. What problems may arise in the absence of elected people's representatives in the local level? Make a note and present in the
meriva

Explanation:

There wud be chaos in the house

3 0
3 years ago
¿puede decirse que la finalidad de la política es el bien común? ​
adelina 88 [10]

Answer: Se entiende por bien común un concepto complejo que abarca, tiene aplicación o relevancia en áreas de la sociología, la política, la filosofía, la economía o el derecho, entre otros. ... De esto se podría inferir que un bien común es aquella cosa que es propiedad o de beneficio -ya sea económico o no- de una comunidad

Explanation:

3 0
2 years ago
In some countries, such as sweden and iceland, there is no "math gap" between boys and girls. this is evidence for the _____ exp
Marysya12 [62]
This is evidence for the "<span>social" </span>explanation of the causes of gender differences.

Social expectation is an internalized social standard for people and associations, therefore for society in general, about what individuals ought to do. It works on two distinct levels, first on specific elite gatherings and afterward on the overall public.
8 0
3 years ago
Other questions:
  • The _____ stage of the general adaptation syndrome is marked by the initial burst of energy that assists the person in dealing w
    7·1 answer
  • Which of the following was affected by Executive Order 8802? (5 points) the branches of the U.S. military with soldiers fighting
    13·1 answer
  • Which explanation of gang activity proposes that youth with a history of violence and crime join gangs and continue their delinq
    6·2 answers
  • The scientific method is a set of techniques for gaining new knowledge about the world in which we live. However, these techniqu
    7·1 answer
  • How did the united states benefit from contact with foreign nations and territories
    13·1 answer
  • The chinese invented of all of the following except______
    12·1 answer
  • The __ is responsible for planning and executing the nation’s military policies.<br> ANSWER QUICK
    12·1 answer
  • What is the overall task of the president as chief executive?
    8·1 answer
  • When groups are arranged hierarchically with different levels of power, social prestige, status, or economic resources, this is
    9·1 answer
  • What are the necessary components of motor control an occupational therapist (OT) must consider when assessing a client followin
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!