Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

In 300 words list and give examples of how to lower or eliminate ricks withing I

ID: 3814839 • Letter: I

Question

In 300 words list and give examples of how to lower or eliminate ricks withing Information technology?

Risk Elimination

As we've seen from multiple sources, Information security related risks deal with information at rest, in transit, and during processing. We are primarily considered with maintaining confidentiality, integrity, and access to data. While we primarily focus on the information technology (IT) aspects of information security, many of the same concepts apply to non-IT related data. For example, leaving a confidential form on your desk while visitors are in your office is a security risk and potentially an incident.

Explanation / Answer

There might be many aspects if we list the names where we eliminate risks in the information technology. Every thing involved in the IT may have equal amount of risk to be there all we have to do is to minimise the risk.

Some important measures to reduce the risk's are

Maintain computers and networks securely:- We must maintian computers servers, network and the data securly without giving acces to all employees. These must be maintain securly with the necessory authorisations to the intended users only. So that our systems and data will be maintained securly.

Using best firewalls and antispyware:- Using the best anti malware softwares we can protect the system and important dta from hacking or some related types of risks. All the computers across the company or business must have this software installed.

Companies must need to taught the employees about the procedures and policiies of the information technology so that they can maintain the business information safly.

Regularly update Software and spyware:- Systems must be uptodate the software and the antivirus so that the security definitions will work much more stronger inorder to prevent the risks.

Password Policies:- Companies must maintain the one passwords policy according to their rules. So that no other user can use the otherones system without their passwords. So that information as well as system both maintained securly.

Limit Remote conections:- By limiting the remote connections the data access from the outside company netwrok will be reduces so that risk of information theft will be minimum.

And the people must get used to lock their screens or systems to prevent security risk as well as personal risk.