Access Millions of academic & study documents

Section G Risk Management.edited

Content type
User Generated
Subject
English
Type
Homework
Showing Page:
1/4
1
Part 4
Section G: Risk Management
Student Name
Institution Affiliation
Course Name
Lecturer Name
Due Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
2
Negative Risks
Risk Identified
Root Cause
Impact
Response plan
1
Theft
Insecurity
Loss of Items
Employ security
personnel and install
CCTV to monitor the
intruders
2
Hardware
Breakage
Employees
carelessness
Increased
maintenance
cost
Prepare shelves where
computers and other
hardware can be placed in
good order to ensure the
safety of the hardware
equipment, like monitors
and desktops.
3
Unreliable
Power Supply
Power outages
Loss of
unsaved data
and also a
waste of time
Install a backup generator
and the UPS to ensure that
when there is a power
outage, the computers and
the internet are not
tampered with.
4
Hacking
Cyber security
efficiency
Loss of
customers
data
Employ an ethical hacker
to identify the loopholes
in the systems and

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
Showing Page:
4/4

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
1 Part 4 Section G: Risk Management Student Name Institution Affiliation Course Name Lecturer Name Due Date 2 Negative Risks 1 Risk Identified Root Cause Impact Response plan Theft Insecurity Loss of Items Employ security personnel and install CCTV to monitor the intruders 2 Hardware Employees Increased Prepare shelves where Breakage carelessness maintenance computers and other cost hardware can be placed in good order to ensure the safety of the hardware equipment, like monitors and desktops. 3 Unreliable Power outages Power Supply Loss of Install a backup generator unsaved data and the UPS to ensure that and also a when there is a power waste of time outage, the computers and the internet are not tampered with. 4 Hacking Cyber security Loss of Employ an ethical hacker efficiency customers to identify the loopholes data in the systems and 3 recommend measures to ensure security. Positive Risks 1 2 Change in Policy Management The positive Implement the policies impact on the that are aimed at success of the achieving the goals of the project project. Technology The positive Update the systems to the Advancement impact on ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4