Working operating systems and distinguish potential threats


The project for this class is to read Chapter 13, which is related to performing a risk analysis related to information security and infrastructure protection. Risk analysis offers organizations a continual strategy to assess and evaluate their current
working operating systems and distinguish potential threats that could harm business operations. The recommendations that are offered as the result of a risk analysis focus on the continuous development of security software for protecting information within the company. You are to research information detailing how to perform a risk analysis using information technology to secure data within an organization. Make sure that you include the following information in your project:

1) What are the objectives and goals of performing a risk analysis on infrastructure and security protection?
2) What is the target audience for whom you are performing a risk analysis?
3) List the steps necessary for performing a risk analysis. Include the following information
a) Assessment and evaluation
b) Threats
c) Cost-effective security measures
4) What types of securities would you include in your risk analysis for recommendation purposes?
5) How would you mitigate a security threat and address it accordingly?

Should be three typed (3) pages with a minimum of two references should be used. Don't worry about format I will take care of that.

Request for Solution File

Ask an Expert for Answer!!
Financial Accounting: Working operating systems and distinguish potential threats
Reference No:- TGS0974321

Expected delivery within 24 Hours