What events are considered triggers for risk assessment


Assignment:

RESPOND TO THESE DISCUSSION POST BASED ON THE TOPIC "What types of events are considered triggers for risk assessment? Make sure to give examples of these types of events. In your initial post, discuss your reasons for the events you selected."

In response to your peers, discuss why you feel the event is a trigger and what the potential impact could be if risk assessment were not conducted. Be sure to consider the cost of risk assessment in your response. (TWO (2) PARAGRAPHS EACH WITH REFERENCES ON

EACH OF THEM SEPARATELY, NOT TOGETHER)

NOTE

APA reminders - In your Discussions and Assignments -

* Use less than 10% direct quotes
* Quotes over 40 words not allowed in this classes (by exception only ahead of time)
* Every quote needs a specific page or paragraph number
* Ideas and concepts from articles on websites need to be re-written in your own thoughts, vocabulary, and ideas and not simply paraphrased.

1JstJns ETTRA

There are many ways to know when a risk assessment is needed. Sometimes it can be as simple as it's been a few years since one was done for the company. Many companies will have guidelines for how often risk assessments need to be done. Sometimes it can be a new vulnerability was discovered in a major component of the security system and the whole system needs to be evaluated and appropriate patches put into place before the network is online. Then it could occur whenever something malicious is found on the network. The CIRT plan will need to be complete and a risk assessment will need to be done afterwards to ensure the rest of the network is safe from whatever happened and that the part of the system that was infected is clean and secure. Also, whenever the government implements new laws that regulate certain information, or regulate the security systems themselves. Really any situation where you feel that the security of the system is at risk. The reason for listing the examples that I have is because these seem to be the most likely reason that a risk assessment would be needed. There are other reasons, and any reason that leads to a risk assessment are good one. I just see these as being the some of the best ones.

2.CrytSadn

There are many events that would be a trigger for a risk assessment. In my discussion I will explore three.

First, an employee brings in an external USB with a worm attached to it. The worm spreads to other workstations by having the files on the USB attached to emails and sent. Because the worm was able to bypass the controls it is necessary to ass the anti-malware software. Is the OS updated to impede malware?

Second, there is too many firewall rules allowing traffic through. A risk assessment needs to be conducted in order to make sure that each firewall is in sync with the others. This traffic could include viruses and malware that could affect the entire organization.

Third, insecure cabinets and closets are a physical security issue. Finding an open LAN room or keys laying around is a call for a risk assessment. Anyone could get into the network and/or damage servers; affecting all the computers connected to the server.

PLEASE READ THIS.IT IS VERY IMPORTANT

Allow your discussion posts to be detailed and capable of sharing knowledge, ideas and points. You must discuss the topic using your own words first. Using your own words indicate you understand the topic of discussions. Secondly, you must cite your sources in-text. This is necessary to justify your points. Sources from several sources showed good research abilities. Lastly, you must provide references at the bottom of your post. A discussion post without justification with sources does not show proper research abilities. A terse and not detailed discussions represent post that would not provide enough sharing of knowledge or proper understanding of the topic. DO NOT just copy and paste a sentence from online with citation at the end as your own discussion. I have not asked for definitions, I asked for discussions and will not buy this. You must show understanding of the discussion topic by using your own words to describe the topic and then justify that with sources.

www.citationmachine.net to format references into the APA style if necessary. Extremely important. Intext citations is very essential and highly needed as well.

use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method (citation should be relevant and current). Page-length requirements:2 PAPARAGRAPHS FOR EACH PROMPT ANSWER. Make sure you cite if you take a piece of someone's work, very important and your reference should relate to your writing (don't cite a reference because it relates to the course and not this very paper) at least 2 current and relevant academic references. No heavy paraphrasing of others work.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: What events are considered triggers for risk assessment
Reference No:- TGS01985769

Now Priced at $20 (50% Discount)

Recommended (97%)

Rated (4.9/5)