RISK MANAGEMENT IN INFORMATION TECHNOLOGY

Main Article Content

SIKENDER MOHSIENUDDIN MOHAMMAD

Abstract

Risk management in information technology is the research problem in my essay. Research has shown that business risks related to information technology risk management can be considered and adopted within an organization or enterprise. The study has been demonstrated that some organizations have a well-laid enterprise risk management set out. In this case, therefore, risk management is seen as part of enterprise risk management. The study will also further expound on the risk management methodology, which constitutes a generic framework. The framework must, therefore, be considered as a risk management exercise. Based on a review of literature, the risk management procedure has taken into account risk assessment that ENISA has over time, reviewed the process to parameterize the entire risk management process. Risk identification states that there can be potential losses when threats, assets vulnerabilities, consequences, and related business processes are not considered. Therefore risk management in information technology must revolve around integrating risk management through the system development life cycle. The process cannot be termed as complete if risk management methods are not considered. In 2006, the threat sketch started a cybersecurity risk assessment that targeted small companies. In this study, the methodology uses real options, to prioritize and forecast a list of fixed high-level threats

Downloads

Download data is not yet available.

Article Details

How to Cite
SIKENDER MOHSIENUDDIN MOHAMMAD. (2021). RISK MANAGEMENT IN INFORMATION TECHNOLOGY. International Journal of Innovations in Engineering Research and Technology, 7(05), 373-380. https://repo.ijiert.org/index.php/ijiert/article/view/1227
Section
Articles

How to Cite

SIKENDER MOHSIENUDDIN MOHAMMAD. (2021). RISK MANAGEMENT IN INFORMATION TECHNOLOGY. International Journal of Innovations in Engineering Research and Technology, 7(05), 373-380. https://repo.ijiert.org/index.php/ijiert/article/view/1227

Similar Articles

You may also start an advanced similarity search for this article.