1,412
10
Case Study, 2 pages (450 words)

Risk management study case study sample

Data is an asset for a person. It contains useful information personal information (Bashaand & Ameen, 2012). So, risk management of data is very important and is an audit of the computer in order to access the discovered vulnerabilities and to take steps for managing loss. As far as asset identification of my personal computer is concerned, the assets comprise of personal computer hardware, operating system, the software, data that I have created, and accessed networks.
My personal computer hardware is identified by the manufacturer, type, model, location, serial number, computer address i. e., Internet protocol, media access control etc and other unique information that is known for identifying the hardware. Following is my PC hardware asset identification.
In threat identification various threat agents are identified. The agents include theft, vandalism, and Operating system failure, human error, compromised systems and natural disaster. The threat identification of my Personal computer is as follows.
Vulnerability appraisal allows determining the security threats (Ciampa, 2011, p. 541). It allows me to have a glimpse on the security state of my personal computer. This can be done by examining inaccurate configurations; lack of the wireless security e. g., the Wi-Fi is not protected and other improper settings of hardware. But, in my case I believe that I have not addressed any kind of vulnerability as my personal computer is very well protected. Further, risk assessment involves determining the damage that can occur due to the attack and the risks associated because of vulnerability (Hester & Harrison, 1998, p. 2). The risk assessment of my personal computer is as under.
As far as risk mitigation is concerned I have used encryption key on my access point of wireless that allows my network to remain protected. I have also configured personal/private firewall i. e., Stealth mode in order to protect the system from the attackers by disallowing unauthorized applications, services and programs from accepting the incoming connections that are not in my knowledge. In case of leaving home I keep my Macbook hidden and while travelling I keep my Macbook bag with me all the time. I have installed Find my Mac feature on my portable Macbook, which helps to track the system with the help of global position system.
In nut shell, I have not uncovered major vulnerabilities in my risk management study of personal computer. The risk feeling arises from vulnerability insecurity that is identified. By taking steps for identifying vulnerabilities, assessing risk and creating a plan in order to mitigate the risk one can protect his/her personal computer from threats.

References

Bashaand, R., & Ameen, J., (2012). Tele-market Modeling of Fuzzy Consumer Behavior. International Journal of Computers and Communications, 1(6), 1-91.
Hester, Ronald E., & Harrison, Roy M. (1998). Risk Assessment and Risk Management. The Royal Society of Chemistry, UK.
Ciampa, Mark D. (2011). Security+ Guide to Network Security Fundamentals (4th ed.). Cengagae Learning, United States of America.

Thank's for Your Vote!
Risk management study case study sample. Page 1
Risk management study case study sample. Page 2
Risk management study case study sample. Page 3

This work, titled "Risk management study case study sample" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Case Study

References

AssignBuster. (2021) 'Risk management study case study sample'. 14 November.

Reference

AssignBuster. (2021, November 14). Risk management study case study sample. Retrieved from https://assignbuster.com/risk-management-study-case-study-sample/

References

AssignBuster. 2021. "Risk management study case study sample." November 14, 2021. https://assignbuster.com/risk-management-study-case-study-sample/.

1. AssignBuster. "Risk management study case study sample." November 14, 2021. https://assignbuster.com/risk-management-study-case-study-sample/.


Bibliography


AssignBuster. "Risk management study case study sample." November 14, 2021. https://assignbuster.com/risk-management-study-case-study-sample/.

Work Cited

"Risk management study case study sample." AssignBuster, 14 Nov. 2021, assignbuster.com/risk-management-study-case-study-sample/.

Get in Touch

Please, let us know if you have any ideas on improving Risk management study case study sample, or our service. We will be happy to hear what you think: [email protected]