Friday, May 1, 2020

Security guide of the network fundamental - MyAssignmenthelp.com

Questions: 1. Identification of information assets of A4A. 2. Identification of InfoSec risks associated with the information assets. 3. Can these risks be different depending on the member institution where a member works? Answers: Answer 1 The information assets of Academics for Academics includes the systems (PC, laptop) on which the projects are to be developed and delivered. The other information asset of the company includes the soft copy and hard copy of the assignments or the projects developed by the members of A4A. This is an information asset of the organization because all the information produced by the members except the emails, marked assignments and exams are properties of the organization. The information system storing all these data is a major information asset of the organization and therefore, proper policies are needed to be enforced for the protection of the same. Answer 2 The major information security risks that are associated with the information asset are virus or malware threat and threat from an insider. Proper security of the information asset is to be ensured in order to prevent the virus or malware attack to the system (Von Solms and Van Niekerk 2013). The organization is further exposed to threat from insider who can make an illegal use of the data or the reports produced in the organization. Answer 3 The risks identified in the previous sections are associated with the information system and its data in A4A. However, there can be other risks as well, depending on the location where the member works. If a member is working from a place outside the organization, there is a possibility of the information theft while its transfer (Ciampa 2012). Furthermore, the information security risk from an insider threat increases as well. References Ciampa, M., 2012.Security+ guide to network security fundamentals. Cengage Learning. Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security.computers security,38, pp.97-102.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.