More Subjects
Intro to Sec W#6
[Name of the Writer]
[Name of the Institution]
Intro to Sec W#6
Projects are based upon various kinds of planning and propositions. All this planning and propositions are based upon different kinds of factors and conditions that need to be fulfilled within a specific period of time. The most worrying factor in the case of project management is risk.
Identifying the Risk
In a system or network, there might arise vulnerabilities that need to be addressed immediately. Vulnerabilities are the weak spots that can be misused by security threats. If these vulnerabilities are left unaddressed, risks are quite probable to happen. A risk involves the possible harmful consequences of the vulnerabilities that have not been addressed in time. The common attacks made against the system should be considered in identifying the risks. Making a portfolio of the vulnerabilities is inevitable to beware of the risks. The techniques for scanning the risks should be employed as well. Further, the risks need to be assessed on qualitative and quantitative basis.
Assessing the Impact
Assessing the impacts of a risk is associated with making an assessment of the probabilities and consequences of the risk factors (Salah, & Moselhi, 2016). It is the probability of risk that can be determined by using the comparable data charts, whereas the impact of risk is an evaluation of the consequences involved. To this end, systems have to be identified and prioritized. The threats need to be identified. The identification of vulnerabilities give a precise assessment as well. Controls should be analyzed. Finally, the possibility of occurrence of an incident has to be determined.
Tracking its Influence
Tracking the risk influences is essential in risk management. For this purpose, certain activities have to be completed. The risk changes have to be monitored first. This activity will provide a basis for further work. The influences of risks can be tracked by gathering the data of the relevant and actual events or incidents. The changes in risk, the triggers, the progress in the alleviation plan, and similar other activities are important in tracking the influences of risks. Using a risk manager is very supportive for the purpose as well.
As technology is playing a vital role in every field of life, it is also posing to be a threat to the human race and the whole world. It can be used as both as a blessing and a curse, depending upon its usage. Technology, especially computers and internet when combined in the form of an integrated network can be used both as a means to instigate terrorism and also to stop it. Technology can be used to build weapons of mass destruction and use them against human race, especially nuclear weapons.
Department of Homeland Security Strategic Framework (DHS) has played a major role in the control and curb of terrorism since 2001. The department has been working tirelessly since its initiation and especially protects the people of America from the explosive attacks. According to the Secretary of the Department, there is no specific strategy to counter terrorism, but the department has to change its methods according to the nature of the situation and the persisting conditions ("DEPARTMENT OF HOMELAND SECURITY STRATEGIC FRAMEWORK FOR COUNTERING TERRORISM AND TARGETED VIOLENCE", 2019).
References
DEPARTMENT OF HOMELAND SECURITY STRATEGIC FRAMEWORK FOR COUNTERING TERRORISM AND TARGETED VIOLENCE. (2019). Retrieved 30 September 2019, from https://www.dhs.gov/sites/default/files/publications/19_0920_plcy_strategic-framework-countering-terrorism-targeted-violence.pdf
Salah, A., & Moselhi, O. (2016). Risk identification and assessment for engineering procurement construction management projects using fuzzy set theory. Canadian Journal of Civil Engineering, 43(5), 429-442.
More Subjects
Join our mailing list
@ All Rights Reserved 2023 info@freeessaywriter.net