IT SYSTEM
COMPONENT |
RISK
|
Likelihood
Impact
Category
|
Likelihood of risk
and consequence |
Suggest risk control
|
1. Hardware
|
1. Theft
-Laptop used by Dean
|
Likely
Severe
High
- The Impact is Severe because Dean
hold many access to important data. |
4
|
Defense
- Lock laptop bag - Bring bag everywhere |
2. Hardware Failure
|
Possible
Significant
Med Hi
- The Impact is Significant because
hardware failure will disturb productivity |
3
|
Defense
-Ensure proper usage of hardware | |
2. Software
|
1. Software failure
- iTaleem crash
- Malware
|
Likely
Significant
Med Hi
The impact of the risk is likely significant because software failure may cause trouble to the company.
|
4
|
Acceptance
- Programmers need to pay more attention when building the software
- Using agile method so that the software is up to date.
|
2. Security flaws
- Https website
- Limited software access
|
Very likely
Severe
High
The impact of the risk is very likely severe because every software need to have high protection so that the software is not easily get attacked.
|
5
|
Defense
- The company should do awareness campaign about the safety of the software so that the software is secured.
- The company should not give access to the outsiders.
| |
3. Network
|
1. Phishing
|
1. Likely, Severe
-The impact of this risk is likely
and severe as the technology is now easily access and someone can easily gain sensitive informations |
4
|
Defense
- Educate users about ethics on using the network. |
2. Malicious Threat
|
2. Possible, Significant
-All devices are equipped with antivirus,
so it is possible to get malicious threat if it is not up-to-date but the impact is significant as it might damage or steal the information from the network. |
3
|
Defense
that it can detect anything from the downloaded files-Install antivirus software and ensure | |
4. Data
|
1. Loss of data
- Hacking - Virus |
Possible
Severe
Med Hi
The impact of this risk is severe as it will
affected the organization where it holds confidential information. |
5
|
Defense
-Backup the data in the cloud computing. - Every organizations need to have BCDR plan. |
2. Breach of data
- Loss of worker id - Password authorization |
Possible
Significant
Med Hi
The impact of this risk is significant when
the organization did not provide a good security measure. |
4
|
Acceptance
- Company need to have special security workshop for workers. | |
5. People
|
1. Old people
|
Very likely
Moderate
Med Hi
|
3
|
Termination
- Set retirement age for the employees - Put a contract term for each employees |
2. Sick employee
|
Possible , Moderate (Medium)
|
3
|
Acceptance
-Give medical insurance to each employees -Provide free medical treatment for each employees | |
6. Process
|
Manual course
registration |
Likely
Significant
Med Hi
|
4
|
Acceptance :
- ITD needs to align with kuliyyah regard students' courses and availability
- Student should get notify all rejected courses that is reserved by them
|
Unsystematic mahallah
registration |
Possible
Moderate
Medium
|
3
|
Acceptance :
Stick to one mahallah registration system only
|
Assigning Likelihood & Consequences/Impact: Risk Category
No comments:
Post a Comment