SlideShare a Scribd company logo
Research and identify three IT-related Risk Management Plans and list your references to the
three plans you found. Then identify 10 important components of an IT Risk Management Plan
and define these components as well as their importance in an organization. The submitted
document should not exceed two pages in length.
Solution
The three IT related risk management plans are as follows:
Following are the components of an IT related risk management plan:
System characterization: System characterization comprises of identification and listing of the
characteristics of a system. This helps the analysts to identify any bug easily in case of
malfunctioning. The various characteristics of a system can be its need, functional requirement,
mission, goal, network, security controls etc.
Threat identification: This refers to identification of the types of threats a system can face in an
organization. The system is designed in such a way that it is able to identify the threats that
might be harmful for the system that is being used. Hacking, viruses, data compromise are some
of the threats that are faced by systems in an organization.
Vulnerability identification: This involves identification of those areas that are vulnerable for a
system. The vulnerable areas are required to be monitored closely.
Control analysis: This involves controlling various functions that are related with a system and
controlling them so that the system works in the way as required by a company.
Likelihood determination: Likelihood determination relates with determining the likeliness that a
threat may be damaging for the system. There might be likelihood that the threat might be high,
medium or low as far as the likelihood of the threat from a bug is concerned.
Impact analysis: This component analyzes the impact of potential threat from vulnerability. The
impact analysis requires taking into account the importance of the system. In case of critical
system the impact from vulnerability would be high.
Risk determination: This involves determining the amount of risk involved in a system. This
allows the system analysts to formulate the plans accordingly.
Control recommendation: The component requires that there should be recommendations in
place that would require controlling of the system so that the system works optimally and gives
the desired results.
Results documentation: There should be a document that should contain all the details that are
related with the results that are to be provided by the system.

More Related Content

Similar to Research and identify three IT-related Risk Management Plans and lis.pdf

Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17koolkampus
 
Access Control and Maintenance.pptx
Access Control and Maintenance.pptxAccess Control and Maintenance.pptx
Access Control and Maintenance.pptx
Kinetic Potential
 
Ch10
Ch10Ch10
internet securityand cyber law Unit3 1
internet securityand  cyber law Unit3 1internet securityand  cyber law Unit3 1
internet securityand cyber law Unit3 1
Royalzig Luxury Furniture
 
System Analysis and Design 1.pptx
System Analysis and Design 1.pptxSystem Analysis and Design 1.pptx
System Analysis and Design 1.pptx
PoonamMalik26
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
Shalini Singh
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
joellemurphey
 
System Analysis and Design concept. objective of the design methodologies .
System Analysis and Design concept. objective of the design methodologies .System Analysis and Design concept. objective of the design methodologies .
System Analysis and Design concept. objective of the design methodologies .
MatildaSanga
 
What are Vulnerability Assessment and Penetration Testing?
What are Vulnerability Assessment and Penetration Testing?What are Vulnerability Assessment and Penetration Testing?
What are Vulnerability Assessment and Penetration Testing?
ShyamMishra72
 
Assignment ContentYou are part of a team selected by the C.docx
Assignment ContentYou are part of a team selected by the C.docxAssignment ContentYou are part of a team selected by the C.docx
Assignment ContentYou are part of a team selected by the C.docx
lesleyryder69361
 
Assignment ContentYou are part of a team selected by the Chi.docx
Assignment ContentYou are part of a team selected by the Chi.docxAssignment ContentYou are part of a team selected by the Chi.docx
Assignment ContentYou are part of a team selected by the Chi.docx
lesleyryder69361
 
What to Expect During a Vulnerability Assessment and Penetration Test
What to Expect During a Vulnerability Assessment and Penetration TestWhat to Expect During a Vulnerability Assessment and Penetration Test
What to Expect During a Vulnerability Assessment and Penetration Test
ShyamMishra72
 
Unit 1
Unit 1Unit 1
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practicesphanleson
 
How to choose the best IT infrastructure monitoring tool for your business
How to choose the best IT infrastructure monitoring tool for your businessHow to choose the best IT infrastructure monitoring tool for your business
How to choose the best IT infrastructure monitoring tool for your business
DevLabs Global
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
EnterpriseGRC Solutions, Inc.
 
Testing
TestingTesting
Testing
BinamraRegmi
 
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptxPRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
GraciaSuratos
 

Similar to Research and identify three IT-related Risk Management Plans and lis.pdf (20)

Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17
 
Access Control and Maintenance.pptx
Access Control and Maintenance.pptxAccess Control and Maintenance.pptx
Access Control and Maintenance.pptx
 
Sdlc
SdlcSdlc
Sdlc
 
Ch10
Ch10Ch10
Ch10
 
internet securityand cyber law Unit3 1
internet securityand  cyber law Unit3 1internet securityand  cyber law Unit3 1
internet securityand cyber law Unit3 1
 
System Analysis and Design 1.pptx
System Analysis and Design 1.pptxSystem Analysis and Design 1.pptx
System Analysis and Design 1.pptx
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
 
System Analysis and Design concept. objective of the design methodologies .
System Analysis and Design concept. objective of the design methodologies .System Analysis and Design concept. objective of the design methodologies .
System Analysis and Design concept. objective of the design methodologies .
 
What are Vulnerability Assessment and Penetration Testing?
What are Vulnerability Assessment and Penetration Testing?What are Vulnerability Assessment and Penetration Testing?
What are Vulnerability Assessment and Penetration Testing?
 
Assignment ContentYou are part of a team selected by the C.docx
Assignment ContentYou are part of a team selected by the C.docxAssignment ContentYou are part of a team selected by the C.docx
Assignment ContentYou are part of a team selected by the C.docx
 
Assignment ContentYou are part of a team selected by the Chi.docx
Assignment ContentYou are part of a team selected by the Chi.docxAssignment ContentYou are part of a team selected by the Chi.docx
Assignment ContentYou are part of a team selected by the Chi.docx
 
What to Expect During a Vulnerability Assessment and Penetration Test
What to Expect During a Vulnerability Assessment and Penetration TestWhat to Expect During a Vulnerability Assessment and Penetration Test
What to Expect During a Vulnerability Assessment and Penetration Test
 
Unit 1
Unit 1Unit 1
Unit 1
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
How to choose the best IT infrastructure monitoring tool for your business
How to choose the best IT infrastructure monitoring tool for your businessHow to choose the best IT infrastructure monitoring tool for your business
How to choose the best IT infrastructure monitoring tool for your business
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
 
Testing
TestingTesting
Testing
 
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptxPRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
 

More from RBMADU

Between 2000 and 2002, then again from 2008 to 2010, access measures.pdf
Between 2000 and 2002, then again from 2008 to 2010, access measures.pdfBetween 2000 and 2002, then again from 2008 to 2010, access measures.pdf
Between 2000 and 2002, then again from 2008 to 2010, access measures.pdf
RBMADU
 
Below is a diagram of the coding strand of DNA showing a gene please .pdf
Below is a diagram of the coding strand of DNA showing a gene please .pdfBelow is a diagram of the coding strand of DNA showing a gene please .pdf
Below is a diagram of the coding strand of DNA showing a gene please .pdf
RBMADU
 
A patient has a tidal volume of 0.50 L, a frequency of breathing or r.pdf
A patient has a tidal volume of 0.50 L, a frequency of breathing or r.pdfA patient has a tidal volume of 0.50 L, a frequency of breathing or r.pdf
A patient has a tidal volume of 0.50 L, a frequency of breathing or r.pdf
RBMADU
 
Write a program to recognizing Idenifier Or Constant in C language.pdf
Write a program to recognizing Idenifier Or Constant in C language.pdfWrite a program to recognizing Idenifier Or Constant in C language.pdf
Write a program to recognizing Idenifier Or Constant in C language.pdf
RBMADU
 
Why having a lipid rich cell wall make a bacteria harder to stain.pdf
Why having a lipid rich cell wall make a bacteria harder to stain.pdfWhy having a lipid rich cell wall make a bacteria harder to stain.pdf
Why having a lipid rich cell wall make a bacteria harder to stain.pdf
RBMADU
 
Which of the following statements about leasing is falseALease fina.pdf
Which of the following statements about leasing is falseALease fina.pdfWhich of the following statements about leasing is falseALease fina.pdf
Which of the following statements about leasing is falseALease fina.pdf
RBMADU
 
using the single linked list code written in the class or in the lab,.pdf
using the single linked list code written in the class or in the lab,.pdfusing the single linked list code written in the class or in the lab,.pdf
using the single linked list code written in the class or in the lab,.pdf
RBMADU
 
A database management system is also referred to as a database. True.pdf
A database management system is also referred to as a database.  True.pdfA database management system is also referred to as a database.  True.pdf
A database management system is also referred to as a database. True.pdf
RBMADU
 
An envolope contains three cards A black card that is black on both.pdf
An envolope contains three cards A black card that is black on both.pdfAn envolope contains three cards A black card that is black on both.pdf
An envolope contains three cards A black card that is black on both.pdf
RBMADU
 
There was a mass extinction of plants and animals at the end of the P.pdf
There was a mass extinction of plants and animals at the end of the P.pdfThere was a mass extinction of plants and animals at the end of the P.pdf
There was a mass extinction of plants and animals at the end of the P.pdf
RBMADU
 
The size P of a certain insect population at time t (in days) obeys t.pdf
The size P of a certain insect population at time t (in days) obeys t.pdfThe size P of a certain insect population at time t (in days) obeys t.pdf
The size P of a certain insect population at time t (in days) obeys t.pdf
RBMADU
 
The fundamental theory of electromagnetic field is based on Maxwell.pdf
The fundamental theory of electromagnetic field is based on Maxwell.pdfThe fundamental theory of electromagnetic field is based on Maxwell.pdf
The fundamental theory of electromagnetic field is based on Maxwell.pdf
RBMADU
 
Part I – Antibiotics and the Human Microbiome Amelia and her family .pdf
Part I – Antibiotics and the Human Microbiome Amelia and her family .pdfPart I – Antibiotics and the Human Microbiome Amelia and her family .pdf
Part I – Antibiotics and the Human Microbiome Amelia and her family .pdf
RBMADU
 
Recall the Squeeze TheoremSuppose that for all n, xn yn zn. If .pdf
Recall the Squeeze TheoremSuppose that for all n, xn  yn  zn. If .pdfRecall the Squeeze TheoremSuppose that for all n, xn  yn  zn. If .pdf
Recall the Squeeze TheoremSuppose that for all n, xn yn zn. If .pdf
RBMADU
 
Since somathesthetic sensation from each side of the body projects t.pdf
Since somathesthetic sensation from each side of the body projects t.pdfSince somathesthetic sensation from each side of the body projects t.pdf
Since somathesthetic sensation from each side of the body projects t.pdf
RBMADU
 
Say whether each of the following statements is true (“T”) or false .pdf
Say whether each of the following statements is true (“T”) or false .pdfSay whether each of the following statements is true (“T”) or false .pdf
Say whether each of the following statements is true (“T”) or false .pdf
RBMADU
 
please help me with two partI Bold it out as wrong part which in t.pdf
please help me with two partI Bold it out as wrong part which in t.pdfplease help me with two partI Bold it out as wrong part which in t.pdf
please help me with two partI Bold it out as wrong part which in t.pdf
RBMADU
 
Matching. Choose the most appropriate answer from the right. 1. Null .pdf
Matching. Choose the most appropriate answer from the right. 1. Null .pdfMatching. Choose the most appropriate answer from the right. 1. Null .pdf
Matching. Choose the most appropriate answer from the right. 1. Null .pdf
RBMADU
 
Numerous diseases are caused by viruses and bacteria (etc. Hepatitis.pdf
Numerous diseases are caused by viruses and bacteria (etc. Hepatitis.pdfNumerous diseases are caused by viruses and bacteria (etc. Hepatitis.pdf
Numerous diseases are caused by viruses and bacteria (etc. Hepatitis.pdf
RBMADU
 
Network peering is a method to save ISP’s network bandwidth and reso.pdf
Network peering is a method to save ISP’s network bandwidth and reso.pdfNetwork peering is a method to save ISP’s network bandwidth and reso.pdf
Network peering is a method to save ISP’s network bandwidth and reso.pdf
RBMADU
 

More from RBMADU (20)

Between 2000 and 2002, then again from 2008 to 2010, access measures.pdf
Between 2000 and 2002, then again from 2008 to 2010, access measures.pdfBetween 2000 and 2002, then again from 2008 to 2010, access measures.pdf
Between 2000 and 2002, then again from 2008 to 2010, access measures.pdf
 
Below is a diagram of the coding strand of DNA showing a gene please .pdf
Below is a diagram of the coding strand of DNA showing a gene please .pdfBelow is a diagram of the coding strand of DNA showing a gene please .pdf
Below is a diagram of the coding strand of DNA showing a gene please .pdf
 
A patient has a tidal volume of 0.50 L, a frequency of breathing or r.pdf
A patient has a tidal volume of 0.50 L, a frequency of breathing or r.pdfA patient has a tidal volume of 0.50 L, a frequency of breathing or r.pdf
A patient has a tidal volume of 0.50 L, a frequency of breathing or r.pdf
 
Write a program to recognizing Idenifier Or Constant in C language.pdf
Write a program to recognizing Idenifier Or Constant in C language.pdfWrite a program to recognizing Idenifier Or Constant in C language.pdf
Write a program to recognizing Idenifier Or Constant in C language.pdf
 
Why having a lipid rich cell wall make a bacteria harder to stain.pdf
Why having a lipid rich cell wall make a bacteria harder to stain.pdfWhy having a lipid rich cell wall make a bacteria harder to stain.pdf
Why having a lipid rich cell wall make a bacteria harder to stain.pdf
 
Which of the following statements about leasing is falseALease fina.pdf
Which of the following statements about leasing is falseALease fina.pdfWhich of the following statements about leasing is falseALease fina.pdf
Which of the following statements about leasing is falseALease fina.pdf
 
using the single linked list code written in the class or in the lab,.pdf
using the single linked list code written in the class or in the lab,.pdfusing the single linked list code written in the class or in the lab,.pdf
using the single linked list code written in the class or in the lab,.pdf
 
A database management system is also referred to as a database. True.pdf
A database management system is also referred to as a database.  True.pdfA database management system is also referred to as a database.  True.pdf
A database management system is also referred to as a database. True.pdf
 
An envolope contains three cards A black card that is black on both.pdf
An envolope contains three cards A black card that is black on both.pdfAn envolope contains three cards A black card that is black on both.pdf
An envolope contains three cards A black card that is black on both.pdf
 
There was a mass extinction of plants and animals at the end of the P.pdf
There was a mass extinction of plants and animals at the end of the P.pdfThere was a mass extinction of plants and animals at the end of the P.pdf
There was a mass extinction of plants and animals at the end of the P.pdf
 
The size P of a certain insect population at time t (in days) obeys t.pdf
The size P of a certain insect population at time t (in days) obeys t.pdfThe size P of a certain insect population at time t (in days) obeys t.pdf
The size P of a certain insect population at time t (in days) obeys t.pdf
 
The fundamental theory of electromagnetic field is based on Maxwell.pdf
The fundamental theory of electromagnetic field is based on Maxwell.pdfThe fundamental theory of electromagnetic field is based on Maxwell.pdf
The fundamental theory of electromagnetic field is based on Maxwell.pdf
 
Part I – Antibiotics and the Human Microbiome Amelia and her family .pdf
Part I – Antibiotics and the Human Microbiome Amelia and her family .pdfPart I – Antibiotics and the Human Microbiome Amelia and her family .pdf
Part I – Antibiotics and the Human Microbiome Amelia and her family .pdf
 
Recall the Squeeze TheoremSuppose that for all n, xn yn zn. If .pdf
Recall the Squeeze TheoremSuppose that for all n, xn  yn  zn. If .pdfRecall the Squeeze TheoremSuppose that for all n, xn  yn  zn. If .pdf
Recall the Squeeze TheoremSuppose that for all n, xn yn zn. If .pdf
 
Since somathesthetic sensation from each side of the body projects t.pdf
Since somathesthetic sensation from each side of the body projects t.pdfSince somathesthetic sensation from each side of the body projects t.pdf
Since somathesthetic sensation from each side of the body projects t.pdf
 
Say whether each of the following statements is true (“T”) or false .pdf
Say whether each of the following statements is true (“T”) or false .pdfSay whether each of the following statements is true (“T”) or false .pdf
Say whether each of the following statements is true (“T”) or false .pdf
 
please help me with two partI Bold it out as wrong part which in t.pdf
please help me with two partI Bold it out as wrong part which in t.pdfplease help me with two partI Bold it out as wrong part which in t.pdf
please help me with two partI Bold it out as wrong part which in t.pdf
 
Matching. Choose the most appropriate answer from the right. 1. Null .pdf
Matching. Choose the most appropriate answer from the right. 1. Null .pdfMatching. Choose the most appropriate answer from the right. 1. Null .pdf
Matching. Choose the most appropriate answer from the right. 1. Null .pdf
 
Numerous diseases are caused by viruses and bacteria (etc. Hepatitis.pdf
Numerous diseases are caused by viruses and bacteria (etc. Hepatitis.pdfNumerous diseases are caused by viruses and bacteria (etc. Hepatitis.pdf
Numerous diseases are caused by viruses and bacteria (etc. Hepatitis.pdf
 
Network peering is a method to save ISP’s network bandwidth and reso.pdf
Network peering is a method to save ISP’s network bandwidth and reso.pdfNetwork peering is a method to save ISP’s network bandwidth and reso.pdf
Network peering is a method to save ISP’s network bandwidth and reso.pdf
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

Research and identify three IT-related Risk Management Plans and lis.pdf

  • 1. Research and identify three IT-related Risk Management Plans and list your references to the three plans you found. Then identify 10 important components of an IT Risk Management Plan and define these components as well as their importance in an organization. The submitted document should not exceed two pages in length. Solution The three IT related risk management plans are as follows: Following are the components of an IT related risk management plan: System characterization: System characterization comprises of identification and listing of the characteristics of a system. This helps the analysts to identify any bug easily in case of malfunctioning. The various characteristics of a system can be its need, functional requirement, mission, goal, network, security controls etc. Threat identification: This refers to identification of the types of threats a system can face in an organization. The system is designed in such a way that it is able to identify the threats that might be harmful for the system that is being used. Hacking, viruses, data compromise are some of the threats that are faced by systems in an organization. Vulnerability identification: This involves identification of those areas that are vulnerable for a system. The vulnerable areas are required to be monitored closely. Control analysis: This involves controlling various functions that are related with a system and controlling them so that the system works in the way as required by a company. Likelihood determination: Likelihood determination relates with determining the likeliness that a threat may be damaging for the system. There might be likelihood that the threat might be high, medium or low as far as the likelihood of the threat from a bug is concerned. Impact analysis: This component analyzes the impact of potential threat from vulnerability. The impact analysis requires taking into account the importance of the system. In case of critical system the impact from vulnerability would be high. Risk determination: This involves determining the amount of risk involved in a system. This allows the system analysts to formulate the plans accordingly. Control recommendation: The component requires that there should be recommendations in place that would require controlling of the system so that the system works optimally and gives the desired results. Results documentation: There should be a document that should contain all the details that are related with the results that are to be provided by the system.