Monday, March 4, 2019

Risk Inventory
















IT SYSTEM
COMPONENT
RISK
Likelihood
Impact
Category
Likelihood of risk
and consequence
Suggest risk control
1. Hardware
1. Theft
-Laptop used by Dean
Likely
Severe
High

- The Impact is Severe because Dean
hold many access to important data.
4
Defense

- Lock laptop bag
- Bring bag everywhere
2. Hardware Failure
Possible
Significant
Med Hi

- The Impact is Significant because
hardware failure will disturb productivity
3
Defense

-Ensure proper usage of hardware
2. Software
1. Software failure
- iTaleem crash
- Malware
Likely
Significant
Med Hi

The impact of the risk is likely significant because software failure may cause trouble to the company.
4
Acceptance

- Programmers need to pay more attention when building the software
- Using agile method so that the software is up to date.
2. Security flaws
- Https website
- Limited software access
Very likely
Severe
High

The impact of the risk is very likely severe because every software need to have high protection so that the software is  not easily get attacked.
5
Defense  

- The company should do awareness campaign about the safety of the software so that the software is secured.
- The company should not give access to the outsiders.
3. Network
1. Phishing
1. Likely, Severe

-The impact of this risk is likely
and severe as the technology is
now easily access and someone
can easily gain sensitive informations
4
Defense

- Educate users about ethics on using the network.
2. Malicious Threat
2. Possible, Significant

-All devices are equipped with antivirus,
so it is possible to get malicious threat
if it is not up-to-date but the impact is
significant as it might damage or steal
the information from the network.
3
Defense

-Install antivirus software and ensure
that it can detect anything from the downloaded files
4. Data
1. Loss of data
- Hacking
- Virus
Possible
Severe
Med Hi

The impact of this risk is severe as it will
affected the organization where it holds
confidential information.
5
Defense

-Backup the data in the cloud computing.
- Every organizations need to have BCDR plan.
2. Breach of data
- Loss of worker id
- Password authorization
Possible
Significant
Med Hi

The impact of this risk is significant when
the organization did not provide a good
security measure.
4
Acceptance

- Company need to have special security workshop for workers.
5. People
1. Old people
Very likely
Moderate
Med Hi
3
Termination

- Set retirement age for the employees
- Put a contract term for each employees
2. Sick employee
Possible , Moderate (Medium)
3
Acceptance

-Give medical insurance to each employees
-Provide free medical treatment for each employees
6. Process
Manual course
registration
Likely
Significant
Med Hi
4
Acceptance :

- ITD needs to align with kuliyyah regard students' courses and availability

- Student should get notify all rejected courses that is reserved by them
Unsystematic mahallah
registration
Possible
Moderate
Medium
3
Acceptance :

Stick to one mahallah registration system only

Assigning Likelihood & Consequences/Impact: Risk Category





  















































































No comments:

Post a Comment