Question: Perform a risk management assessment for this computing and software tools infrastructure. Note observations, identify risks, severities, and recommendations. Areas of concern: Too many people
Perform a risk management assessment for this computing and software tools
infrastructure. Note observations, identify risks, severities, and recommendations.
Areas of concern:
Too many people have admin access to the Windows and Unix systems.
Password configurations may not be set properly for any of the operating
environments.
Unauthorized code changes could be occurring.
Backup tapes are suspect. They should be tested quarterly.
An alternate power source may not be reliable if the main power fails. These
should be tested monthly.
Improper database access could be taking place.
Policies and procedures are outdated.
Remote access is performed via RDP from the Internet.
Deliverables
Layout and format. The layout and format for the miniproject are defined in the
Risk Register document template.
Perform a risk assessment on this system.
Executive summary. Provide an assessment of the computing environment and
areas of concern. Document the most serious risks. Describe the areas of most
concern based on the information above and the probable events that might
occur. You should add a summary assessment on the current state of the project
vs the ideal state and make recommendations.
Risk Register Use the Risk Register template to define the risks for this project.
Copy and paste the table in the template in order to have a risk register entry for
each identified risk. The items in the risk register entry include:
Risk number. A unique number assigned to each risk register entry. Use
any suitable numeric or alphanumeric format.
Observation. A brief description of the issue.
Risk. The impact value of the risk. Estimates are ok here.
Severity. The options are Low, medium, High, and Critical.
Recommendations. List any ways that the likelihood of the risk can be
reduced or its impact on the project reduced.
How many risks should you identify? At least eight major risks across all
environments
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
