Saturday, May 11, 2019

Forensics and security report Essay Example | Topics and Well Written Essays - 1500 words

Forensics and security department report - canvass ExampleIt is within this background therefore that this particular report intends to provide an analysis on security assessment touching on the processes involved, the key technologies used and the necessity for forensic procedures and policies.With the increased dependence on the computer systems, the risk relating to information security has no doubt joined a range of risks that organizations use up to manage (Landoll, 2011). Regardless of the risk type, all risk assessments normally contain the following processesDefining the warrantor Domain This step involves the identification of the major security areas that are deemed vulnerable to security risks or obviously the identification of the risk within a chosen domain/field of interest. Risks are often nigh events ,as a result, their identification can begin with finding out their sources, which may be either inwrought or externalIdentifying Assets This stage involves identi fying as hearty as determining the value, sensitivity, as well as the criticality of not only the assets but also the operations that may be affected if a given threat occursto ascertain the operations and even assets that are most authoritative. The step often involves classifying that which is significant or of value to the organization including the tangible assets much(prenominal) as the data processing machines/equipment, buildings and employees, as well as the intangible assets, which may include the intellectual propertyIdentifying threats This step involves detecting threats deemed to harm and, therefore, seriously affect not only the critical operations but assets as well. The threats may include things such as disgruntled employees, intruders, terrorists, criminals and even natural disasters.Identifying Vulnerabilities This entails identifying and estimating the probability that given threats may materialize by relying on past information as well as judgment of well-inf ormed experts. This often calls for a

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.