preview

WEEK TWO CMGT 400 INDIVIDUAL ASSIGNMENT Essay

Good Essays

Common Information Security Threats involving Ethical and Legal
Sally Lowe
CMGT 400
January 19, 2015
Kell, David
Common Information Security Threats involving Ethical and Legal

Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face various security issues from mobile devices that connect to the network, often unintentionally.
Identification of Threats
There are many threats a network faces when the IT department allows students to connect to the network or Internet …show more content…

Risk management includes the “overall decision-making process of identifying threats and vulnerabilities and their potential impacts, determining the costs to mitigate such events, and deciding what actions are cost effective to take to control these risks” (Conklin et al, 2012, pg. 678). For the proper development of risk management techniques, every person at every level of the organization, especially those involved in the Information Security (IS) department “must be actively involved in the following activities:
Evaluating the risk controls
Determining which control options are cost effective
Acquiring or installing the appropriate controls
Overseeing processes to ensure that the controls remain effective
Identifying risks, which includes:
Creating an inventory of information assets
Classifying and organizing those assets into meaningful groups
Assigning a value to each information asset
Identifying threats to the cataloged assets
Pinpointing vulnerable assets by tying specific threats to specific assets
Assessing risks, which includes:
Determining the likelihood that vulnerable systems will be attacked by specific threats
Assessing the relative risk facing the organization’s information assets, so that risk management and control activities can focus on assets that require the most urgent and immediate attention
Calculating the risks to which assets are exposed in their current setting
Looking in a general way at controls that might come into play for identified

Get Access