​Access Control and Risk Management

User Generated

wbuaxraarql

Writing

Description

Access Control and Risk Management

It is an accepted truth that without risk there can be no gain. Every individual and organization who wants to succeed must take some risks. Network security and its impact on risk management is not about not taking risks, but about taking risks in a controlled environment for which one must understand the risks, their triggers and their consequences.

Write a four to five (4-5) page paper in which you:

  1. Contrast access control in relations to risk, threat and vulnerability.
  2. Explain the relationship between access control and its impact on CIA (maintaining network confidentiality, integrity and availability).
  3. Describe access control and its level of importance within information security.
  4. Argue the need for organizations to take implement access controls in relations to maintaining confidentiality, integrity and availability (e.g., Is it a risky practice to store customer information for repeat visits?)
  5. Describe the necessary components within an organizations access control metric.
  6. Use at least two (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Explain the basic concepts and need for network security and risk management.
  • Use technology and information resources to research issues in IT network security.
  • Write clearly and concisely about topics related to IT network security using proper writing mechanics and technical style conventions.

please follow the instructions properly.


User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

check the assignemnt

Running Head: ACCESS CONTROL AND RISK MANAGEMENT
Access Control and Risk Management
Name
Institution

1

ACCESS CONTROL AND RISK MANAGEMENT
In today’s world protecting the data as well as data in a critical considerations in a business. In
most cases the customers wants their information to be secure and protected in your hands.
Losing their information will automatically lead to the failing of your business. Most of the
clients who have some critical as well as sensitive data ensure that before they share their
information with you they ensure that one is capable of keeping their information in a safer
place. As a way of ensuring that one has a stronger security data one must be sure to have a
stronger understanding of the understanding of the relationship between the three different
components. These components are threat, vulnerability as well as risk vulnerability. These
terms frequently used in an interchangeable manner but despite the fact they are related they are
way too different in terms of their meaning as well as implications. A threat is something that
attacks which will use the vulnerability which might not be mitigated since someone forgot to
understand it’s a risk. Threat on the other hand is anything that might exploit vulnerability in an
intentional damage, obtain as well as destroying an asset. Risk is a potential loss or destruction
which is as a result of the threat in exploiting the vulnerabilities (Lam, 2014).
Confidentiality availability as well as integrity is a model that is designed so as to guide the
policies of the data security in an organization. C...


Anonymous
Very useful material for studying!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags