Great thoughts on the vulnerability and risk assessment content “Below”. Iin 200-250 words answer the following follow up question” Risk assessments are important. Should they be completed on every project? Why or why not?
Orginal thoughts
“Information security is basic to the current organizations, especially thinking about computerized systems changes and the approach of stricter information protection guidelines. With so much information being stored digitally, cyberattacks have become the greatest danger to hierarchical information and data (Wheeler, E. (2011)). In any case, the initial phase in managing these potential risks includes discovering approaches to forestall them in any case.
Vulnerability assessment and Risks assessment, to some extend, may seem similar, but actually, they are two different concepts altogether. Risks are possible threats that are related to an organization’s use of processes, technology, and procedures (Bala Sethunathan, 2021). On the other hand, vulnerabilities are cracks and weaknesses that challenge an organization’s effort to maintain Information Security.
Vulnerability assessment focuses on distinguishing existing shortcomings in resources or control that malicious people can use for exploitation and cause destruction. Playing out a vulnerability evaluation and assessment permits an association to determine weaknesses and security cracks and gaps which it afterward takes measures to do away with (Bala Sethunathan, 2021). Risk assessment concentrates on finding out possible threats that an organization can face while carrying certain activities or projects. The idea behind risk assessment is to identify regions of inadequate knowledge, fill the gaps, and take actions to alleviate the possible risks. For example, if an organization wants to avoid risks, threats, as well as vulnerability, and the possibility of data loss, it’s important to conduct a reasonable risk and vulnerability assessment. This way, they do not compromise their data to cyberattacks or unauthorized access.”
References
Wheeler, E. (2011). Security risk management: Building an information security risk management program from the ground up. Waltham, MA: Syngress. ISBN-13: 9781597496155
Bala Sethunathan. (2021, March 8). How to use a risk assessment vs. a vulnerability assessment. SoftwareONE. https://www.softwareone.com/en/blog/all-articles/2021/03/08/how-to-use-a-risk-assessment-vs-a-vulnerability-assessment
Last Completed Projects
| topic title | academic level | Writer | delivered |
|---|
