Risk Assessment: Protecting Your Sets

Read Summary

The risk assessment is a crucial step in implementing security plans to protect assets against threats. In order to create an effective access control plan, management must carefully plan and create security groups and settings to prevent standard security problems from occurring. The plan should include security strategies, permissions for users, security policies, information security strategies, and administrative policies. Delegating administrative tasks and implementing auditing practices are also important components to consider. Overall, an access control plan is essential in ensuring the security and protection of assets within an organization.

Table of Content

The risk assessment provides a baseline for implementing security plans to protect sets against threats. Within the risk assessment some basic questions must be answered, What assets within the organization need protection, What are the risks to each of these assets, How much time, effort, and money is the organization willing to spend to upgrade or obtain new adequate protection against these threats?

Developing an Effective Organization-wide Access Control Plan Because the management of security groups, Calls, and security settings need to be careful planned, and creating an access control plan that could assist in preventing standard security problems from occurring. Standard security robbers that want to prevent from occurring are: Inefficiently protecting network resources and assigning users too much rights and permissions, or too little rights and permissions to perform their daily tasks, or continuously performing ad hoc security configurations to correct security settings.

Access control plan will include, Security Strategies: This component will outline general security strategies that deals with all possible threats identified as security risks. Permissions will be given to different users according to their position in the Organization, and security groups should be defined so permissions can e implemented effectively. Security policies: Will determine the configuration settings implement for the Security Settings of Group Policy in Active Directory.

Access control plan will also include Information Security Strategies: This component will detail the manner in which to implement information security solutions like encrypting file system (FEES), if applicable for the network. Administrative policies: This component involves detailing those policies for delegating administrative tasks, and should also include all auditing practices.

Cite this page

Risk Assessment: Protecting Your Sets. (2018, Jul 01). Retrieved from


Remember! This essay was written by a student

You can get a custom paper by one of our expert writers

Order custom paper Without paying upfront