Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Types of Risks in IT, Research Paper Example

Pages: 2

Words: 680

Research Paper

In everything that people do there are always risks. Alvin Toffler said that, “Our technological powers increase, but the side effects and potential hazards also escalate.” What he meant is the farther that people go into innovating and creating new technologies the more risks and dangers that will increase. Risk are at every level within IT infrastructures including the seven domains that exist in a typical enterprise IT architecture such as workstation, user, IAN, LAN to Wan, Remote Access, System/Application, and WAN domain. When IT managers create risk management plans they must outline and plan for potential risks, impact, and the risk mitigated when cost do not outweigh the risk.

In typical IT infrastructure there are several risks that continue to threaten the security and safety of organizations and the people they employ. These risks include to an IT infrastructure include, “their constant availability is threatened by natural events, technical failure or human error and intentional acts of a terrorist or other criminal nature.” (Federal Ministry of Interior, 2008) As the threat of risks increase the vulnerability of infrastructures increases as well. Types of risks can include the modification, destruction, and illegal disclosure of information or data, errors and omissions, disruptions that are due to man-made or natural disasters, and failure on the part of employees to exercise diligence and due care of operation of the IT infrastructure. (Moteff, 2005) These risks can severely threaten and impact the level of security and function of IT infrastructures.

When creating risk mitigation plans it is essential for IT managers to assess the levels of risks, impacts, and costs they may arise in the seven domains of a typical IT infrastructure. Within the user domain the people that access the information system must be protected against unauthorized leak or breech of information. Workstation domain is where the employers connect to the IT infrastructure so data breech from desktop and other devices that connect to the network must be evaluated for viruses or data breeches. LAN (Local Area Network) includes all the computers connected to the network and must be outlined as they are connected through radio waves, wired, or fiber optic cables. In the LAN to WAN domain is where companies connect to the internet and where they are most vulnerable. WAN domain connects to remote locations which can connect to the internet through routers, and equipment that must require continuous management and monitoring. Remote Access Domain connects remote users to the IT infrastructure via the internet through VPN vendors. The system/application domain is the most critical and obtains information systems, data, and applications of the organization. (Kim, Solomon, 2012) When creating the risk plan it is important that the seven domains be evaluated to identify potential risks that may be costly to the organization.

The best practices in risk management planning including to identify risks that may potentially impact the IT infrastructure. In risks management recognition of risk can occur, by managing risks managers can avoid problems and control costs. Risk management process contains the procedure used in managing risks in the planning stage that include; risk identification, risk analysis, risk mitigation planning, and risk response. Responsibility for risk identification where the IT managers take the overall responsibility of tracking risks and developing risk and contingency plans during the planning stage. Contingency plans are developed as action plans to be implemented if the risks identified occur. These best practices used in risk mitigation and planning are an essential function for IT managers in order to properly identify, plan, monitor, and implement if needed within an IT infrastructure. Risks will happen but the plan is to be prepared and have procedures in place to control the impact and the cost to the organization.

References

Kim, David, Solomon, Michael. (2012). Fundamentals of information systems security. Sudbury, Mass.: Jones & Bartlett Learning.

Moteff, Jeff. (2005). “Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences.” CRS Report for Congress. Retrieved from http://www.fas.org/sgp/crs/homesec/RL32561.pdf

“Protecting Critical Infrastructures Risk and Crisis Management.” (2008) Federal Ministry of Interior. Retrieved from http://www.bmi.bund.de/SharedDocs/Downloads/EN/Broschueren/Leitfaden_Schutz_kritischer_Infrastrukturen_en.pdf?__blob=publicationFile

“Risk Mitigation Planning, Implementation, and Progress Monitoring.” (n.d) MITRE. Retrieved from http://www.mitre.org/work/systems_engineering/guide/acquisition_systems_engineering/risk_management/risk_mitigation_planning_implementation.html

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

What Can Be Learned From the History of the Marshall Plan About the Importance of the United States, Research Paper Example

Introduction After the ending of the Second World War in 1945 Europe was changed forever and began a transformation of re-construction of buildings, culture and [...]

Pages: 8

Words: 2098

Research Paper

What Is the Future of the Canadian Economy as the Government Ends Stimulus Spending, Research Paper Example

Q1 |  Jim Flaherty, The Federal Minister of Finance for the Canadian Government expressed the following economic ideology on the ending of stimulus spending :-  [...]

Pages: 6

Words: 1595

Research Paper

Relationships Between Nursing Concepts, Research Paper Example

Abstract In the field of nursing, the major components come together in an almost limitless number of ways. The nurse, the environment, the state of [...]

Pages: 4

Words: 1091

Research Paper

PepsiCo Supply Chain, Research Paper Example

Abstract Supply chain management is an ongoing process that must constantly be evaluated and adjusted to enable corporations to improve efficiency and decrease costs.  Currently, [...]

Pages: 5

Words: 1432

Research Paper

Hearing-impaired Children, Research Paper Example

When parents have a child with hearing impairment, they are presented with a variety of challenges regarding their child’s social, physical, and academic development.  Hearing [...]

Pages: 10

Words: 2815

Research Paper

Crime Pattern Analysis, Research Paper Example

Abstract Crime Pattern Analysis is discussed within the context of Criminal Justice.  A brief definition exploring the concept of Crime Pattern Analysis and the theoretical [...]

Pages: 3

Words: 782

Research Paper

What Can Be Learned From the History of the Marshall Plan About the Importance of the United States, Research Paper Example

Introduction After the ending of the Second World War in 1945 Europe was changed forever and began a transformation of re-construction of buildings, culture and [...]

Pages: 8

Words: 2098

Research Paper

What Is the Future of the Canadian Economy as the Government Ends Stimulus Spending, Research Paper Example

Q1 |  Jim Flaherty, The Federal Minister of Finance for the Canadian Government expressed the following economic ideology on the ending of stimulus spending :-  [...]

Pages: 6

Words: 1595

Research Paper

Relationships Between Nursing Concepts, Research Paper Example

Abstract In the field of nursing, the major components come together in an almost limitless number of ways. The nurse, the environment, the state of [...]

Pages: 4

Words: 1091

Research Paper

PepsiCo Supply Chain, Research Paper Example

Abstract Supply chain management is an ongoing process that must constantly be evaluated and adjusted to enable corporations to improve efficiency and decrease costs.  Currently, [...]

Pages: 5

Words: 1432

Research Paper

Hearing-impaired Children, Research Paper Example

When parents have a child with hearing impairment, they are presented with a variety of challenges regarding their child’s social, physical, and academic development.  Hearing [...]

Pages: 10

Words: 2815

Research Paper

Crime Pattern Analysis, Research Paper Example

Abstract Crime Pattern Analysis is discussed within the context of Criminal Justice.  A brief definition exploring the concept of Crime Pattern Analysis and the theoretical [...]

Pages: 3

Words: 782

Research Paper

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!