CMGT 430 Week 2 Individual Applying Risk Management Consulting

16 Oct No Comments

Risk Management Consultation


Risk Management

Goal of Risk Management

Focus of Risk Management

Physical SecurityData SecurityOperations

Organizations Assets Within Our System

{073A0DAA-6AF3-43AB-8588-CEC1D06C72B9}System ComponentsRisk Management ComponentsPeople-People Inside an Organization-People Outside an Organization-Trusted employees-Other Staff-People at Trusted Organizations-StrangersProcedures-Procedures-IT and Business Standard Procedures-IT and Business Sensitive ProceduresData-Data/Information-Transmission-Processing-StorageSoftware-Software-Applications-Operating Systems-Security ComponentsHardware-Hardware-Systems and Peripherals-Security DevicesNetworking-Networking Component-Intranet Components-Internet or Extranet Components

Example Sets

{073A0DAA-6AF3-43AB-8588-CEC1D06C72B9}VulnerabilityRiskMitigationDenial of ServiceInadequate network management Implement firewall hardware and softwareMalicious Code No anti-virus software Install anti-virus protection Theft and Fraud Lack of physical security Install CCTV, cameras


Whitman, M.E., & Mattord, H.J. (2010). Management of Information Security (4th ed.). Retrieved from Management of Information Security

Click following link to download this document

CMGT 430 Week 2 Individual Applying Risk Management Consulting.pptx

Would you like your assignment done free from plagiarism by an expert? Place your order now and it shall be done within the timeframe you indicate.

To view and download a complete answer, scroll down to the bottom to pay Pay to view