Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

IT Security Initiative: Assessing Risks, Implementing Policies, and Evaluating Tools, Thesis of Law

A comprehensive it security initiative that focuses on three key components: risk assessment, security policy design and implementation, and evaluation of security tools. The report delves into the importance of risk assessment procedures, data protection processes and regulations, the design and implementation of a security policy, and the main components of an organizational disaster recovery plan. It provides a detailed discussion on each of these aspects, highlighting the significance of implementing robust security measures to safeguard an organization's critical information and assets. The document aims to serve as a valuable resource for organizations seeking to enhance their cybersecurity posture and mitigate potential security risks.

Typology: Thesis

2022/2023

Uploaded on 10/14/2023

duongnguyen58
duongnguyen58 🇻🇳

2 documents

1 / 6

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
ASSIGNMENT 2 FRONT SHEET
Qualification BTEC Level 5 HND Diploma in Computing
Unit number and title Unit 5: Security
Submission date 14/04/2023
Date Received 1st
submission
Re-submission Date Date Received 2nd
submission
Student Name Bui Nguyen Ngoc Han Student ID BH00150
Class IT0503 Assessor name Le Van Thuan
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature Bui Nguyen Ngoc Han
Grading grid
P5 P6 P7 P8 M3 M4 M5 D2 D3
1
pf3
pf4
pf5

Partial preview of the text

Download IT Security Initiative: Assessing Risks, Implementing Policies, and Evaluating Tools and more Thesis Law in PDF only on Docsity!

ASSIGNMENT 2 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing Unit number and title Unit 5: Security Submission date 14/04/2023 Date Received 1st submission Re-submission Date Date Received 2nd submission Student Name Bui Nguyen Ngoc Han Student ID BH Class IT0503 Assessor name Le Van Thuan Student declaration I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice. Student’s signature Bui Nguyen Ngoc Han Grading grid

P5 P6 P7 P8 M3 M4 M5 D2 D

I. INTRODUCTION

Hello, I work for a security advisory firm in Hanoi. Today, I'd like to introduce you to our IT security initiative, which is divided into three major components. The first section of the initiative focused on the company's security risks. External attacks,

  1. Define Risk & Risk assessment 1.1. Risk To start the report, let's learn about risk and risk assessment. Risk refers to the possibility of problems such as data and assets being destroyed, damaged or lost due to cyber threats. 1.2. Risk assessment Risk assessment is one of the major components of a risk analysis. This is a systematic process performed by a competent person which involves identifying, analyzing, and controlling hazards and risks present in a situation or a place. This decision- making tool aims to determine which measures should be put in place in order to eliminate or control those risks, as well as specify which of them should be prioritized according to the level of likeliness and impact they have on the organization.
  2. Explain Asset, threat and threat identification procedure, give example
  3. Explain the risk assessment procedure Figure 1 : Risk assessment
  1. List risk identification steps P6 Explain data protection processes and regulations as applicable to an organisation
  2. Define data protection
  3. Explain data protection process with relations to organization
  4. Why are data protection and regulation important? P7 Design and implement a security policy for an organisation
  5. Define and discuss what is security policy
  6. Give examples of policies
  7. Give the most & should that must exist while creating policy
  8. Explain and write down the element of security policy
  9. Give the steps to design a policy P8 List the main components of an organisational disaster recovery plan, justifying the reasons for inclusion
  10. Discuss with explanation about business continuity
  11. List the components of recovery plan
  12. Write down all the steps required in disaster recovery process