INFORMATION TECHNOLOGY RISK MANAGEMENTEvery friendship follows a bursting charge that involves the automation of their operations in to passage large quantities of study at a faster pace . Automation of data processing therefore requires the need for information engineering (IT ) which is at present recognized as a aboriginal facility for operations watchfulness (NIST , 1995 . However , any operations has the probability of world affected by disaster and expert problems , hence it is classic to consider danger management strategies that ar related to the recitation and application of information technologies . A happen management appendage that is applied for IT-related operations because serves as a vital position in safeguarding the information assets of a companion and therefore , its missions and goals , from any IT-related disaster . It should be thus understood that IT pretend management is an important function of the management component of a companionship and not just merely a technical job that is performed by IT professionals of a companyIn to better understand IT risk management , the term risk should first be delimit . The word risk pertains to the holistic negative effect of an incidents to which a place , person or group is vulnerable to (Chadbourne and Sanders , 1999 . A risk encompasses both the chances of the incident or disaster occurring , as well as the impact of the incident on the pack and place of concern . Thus risk management describes the process of pinpointing the risk , evaluating the type and degree of risk and designing methods that would minify the occurrence of specific risks in to keep on its occurrence as well as decrease the damages that may be incurred should a disaster take placeIn terms of a company that employs information technologies , risk management involves to perform sound risk management choices that would secure the company s IT system as it is utilise as a storage , processor and transmitter of a company s information (NIST , 1996 .
IT risk management thus involves apportioning of a portion of the company s budget in end such measures in to minimize damages and ultimately , to prevent any untoward incidents in the future . Information technology is generally employed not only by IT technical professionals , but also by the non-technical employees of a company . It is thus helpful that the entire personnel of a company are aware of the risk management strategies that have been designed for their company . A number of personnel must be set that would be responsible for the major operations of the IT risk management program of a company . Included in this prime group are the members of the senior management who generally lead and determine the budget that will be allocated for the security of the company s IT . Another key position of an IT risk management squad is the chief information officer , who is responsible for the implementation of the measures for IT risk management . In addition other key positions implicate the security program manager , the technical support officers for the database , profit and system of the company...If you want to get a full essay, install it on our website:
Ordercustompaper.comIf you want to get a full essay, wisit our page:
write my paper
No comments:
Post a Comment