Wednesday, May 6, 2020

Information Technology Risks Samples †MyAssignmenthelp.com

Question: Discuss about theInformation Technology Risks. Answer: Introduction Information technology is the utilization of systems to handle, store and retrieve information. Risks that are related to information technology are known as information technology risks or IT risks (Alhawari et al., 2012). These types of risks are extremely common in information technology. However, these risks can be reduced with different approaches. This report outlines the various approaches to reduce risks in information technology. Discussion The application of the methods of risk management is known as IT risk management. The information technology risks can be controlled with various and different approaches. The different risks of information technology are as follows: i)Obsolete operating systems: The outdated and obsolete operating system is a major threat and risk in information technology. ii) Lack of encryption: The lack of encryption of the important and the confidential messages is another major threat in information technology (Venkatesh, Thong Xu, 2012). iii) Using others phones or tablets: Opening various confidential applications in electronic devices that are not owned by the user is another basic threat in information technology. iv) Over-reliance on security scanning devices: Dependency on the software or devices that monitor security completely is another threat or risk in information technology. v) Insufficient logging of system: Insufficient system logging is another major threat in information technology. The approaches to reduce IT risks and to improve information technology security are as follows: i) Secure servers, computers and wireless networks: The main step towards improving IT security and managing IT risks is to secure the wireless networks, servers and the computers. Wireless networking is the process by which networking is installed without installing wires. This type of network should be secured in the first position to reduce the risks in information technology (Kotelnikov, 2014). Another important approach to improve security in IT is to secure the servers and the computers, through which the information is stored, retrieved and handled. ii) Installation of anti-spyware and anti-virus protection: Firewalls should be present in every personal computers. Anti-virus and anti-spyware software should be installed in all computers to secure the information technology and to improve security. iii) Use and update passwords: Passwords should be used and updated regularly, so that there is a less chance of hacking and phishing. Use of passwords improves security in information technology. iv) Update software regularly: Software should be updated regularly to their latest versions (Schwalbe, 2015). There is a high chance of IT risks if software are not updated and used in their obsolete versions. v) Use data back-ups: Data back-ups should be used, which includes off-site and remote storage. Data back-ups improve security and reduce risks of information technology. vi) Personnel training: All the personnel should be trained thoroughly for the information technology procedures and policies. vii) Intrusion detection systems: Introduction of intrusion detection systems in information technology can reduce and mitigate risks. Conclusion Therefore, from the above discussion, it can be concluded that information technology deals with various risks and threats that are vulnerable to the system. Such risks can be identified with proper measures so that hackers cannot intrude into the systems. The above report contains all the probable risks and the measure to reduce and control those risks. References Alhawari, S., Karadsheh, L., Talet, A. N., Mansour, E. (2012). Knowledge-based risk management framework for information technology project.International Journal of Information Management,32(1), 50-65. Kotelnikov, V. (2014). Small and medium enterprises and ICT. Schwalbe, K. (2015).Information technology project management. Cengage Learning. Venkatesh, V., Thong, J. Y., Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.