Welcome to Legit Writing

LegitWriting LegitWriting

IT Risk Analysis

Project description
LO1 – You will be able to apply appropriate theory, tools and techniques to the assessment and development of secure computer-based systems.

Specifically, you will be able to identify assets in an organisation and evaluate potential threats and the losses that may be incurred as a result of those threats. You will use risk analysis methods to assist in that process and will be aware of available tools to enable that process.

LO2 – You will be able to identify and specify IT Security requirements to meet business needs.

From analysis of the business needs of an organisation you will be able to identify the basic IT security policies and procedures required to operate in a secure way.

LO3 – You will be able to analyse and evaluate risks to an organisation and its IT assets and recommend appropriate countermeasures to IT system.

Having determined the risks that an organisation may face in respect of IT Security, you will be able to evaluate these in terms of probability of occurrence and impact on the organisation, and will be able to recommend appropriate steps to be taken based on your evaluation.

Description of Module
The module aims to develop an understanding of the risk and threats that may affect IT systems and electronic business. The module will enable you to use tools and techniques to analyse those risks and evaluate their consequences. You will learn how to apply countermeasures to eliminate those risks or reduce the consequences should a risk or threat incident occur.

Learning Outcomes
LO1 – You will be able to apply appropriate theory, tools and techniques to the assessment and development of secure computer-based systems.

LO2 – You will be able to identify and specify IT Security requirements to meet business needs.

LO3 – You will be able to analyse and evaluate risks to an organisation and its IT assets and recommend appropriate countermeasures to IT system

Interpretation of learning Outcomes

LO1 – You will be able to apply appropriate theory, tools and techniques to the assessment and development of secure computer-based systems.

Specifically, you will be able to identify assets in an organisation and evaluate potential threats and the losses that may be incurred as a result of those threats. You will use risk analysis methods to assist in that process and will be aware of available tools to enable that process.

LO2 – You will be able to identify and specify IT Security requirements to meet business needs.

From analysis of the business needs of an organisation you will be able to identify the basic IT security policies and procedures required to operate in a secure way.

LO3 – You will be able to analyse and evaluate risks to an organisation and its IT assets and recommend appropriate countermeasures to IT system.

Having determined the risks that an organisation may face in respect of IT Security, you will be able to evaluate these in terms of probability of occurrence and impact on the organisation, and will be able to recommend appropriate steps to be taken based on your evaluation.

For the scenario:

1. Identify Risks to the organisation surrounding the information technology and information systems used with in the case study context.

2. Analyse and evaluate the identified risks which you highlighted in part 1.

3. Identify and justify appropriate countermeasures to the identified risks. A full range of alternative or complimentary countermeasures to an identified risk should be considered

5. Detail recommendations for the organisation of appropriate solutions to suit their needs, with justification of approach and prioritized implementation schedule.

This is a teaching case, prepared purely for the purpose of assessing students in their IT risk analysis skills.  It is not intended to represent any actual company or industry.

Scenario

Well Done, you have just gained your first post as an IT Risk Analysis after completed your degree at the University of Wolverhampton. You have been a appointment by Wolves Techs Limited to be a professional consultant to provide support and recommendations regarding the risks and requirements associated with their IT/IS systems.

Essential Information

The company “Wolves Techs Limited” have been trading for 3 years based in a converted barn. The main business of the company is processing data for major retailers to provide detailed analysis of customer spend on products and services. Currently run by a Director with 2 staff. Increased turnover and demand for reports has resulted in a requirement to move to new premises with additional staffing of 4 new people. They have sought a location more suitable for data processing than their present rural location that currently has limited broadband width and less opportunity for staff to commute.

They have acquired a 2 storey office just off of the ring-road of a major town. This is currently an empty shell in a 1930s building.

A basic layout of the offices has been detailed (see plans below) and the company recognize that with the nature of their work, much needs to be done to ensure security of IT and the data it processes.

Your task is to carry out an IT Risk Assessment for the company providing a detailed report of your analysis and recommendations to address those risks as set out in the assignment above.

Interior:

Ground Floor Plans

Interior: First Floor Plans

PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂

Are you interested in this answer? Please click on the order button now to have your task completed by professional writers. Your submission will be unique and customized, so that it is totally plagiarism-free.