• Research Paper on:
    Security Risk and Analysis Planning: A Comparative Overview

    Number of Pages: 4

     

    Summary of the research paper:

    This is a 4 page paper that provides an overview of security risk analysis methodologies. VSAT, ORM, and CARVER + Shock are compared and contrasted. Bibliography lists 4 sources.

    Name of Research Paper File: KW60_KFsecuri.doc

    Buy This Research Paper »

     

    Unformatted Sample Text from the Research Paper:
    listed below. Citation styles constantly change, and these examples may not contain the most recent updates. Security Risk and Analysis Planning: A Comparative Overview ,  11/2010 --properly! As the dimensions of business expand ever-increasingly into the digital realm and other new frontiers, the importance of security  management and analysis becomes all the more apparent. Flawed is the approach to business which emphasizes goal-setting and strategic development, but doesnt plan for the unpredictable eventualities which might undermine  that development. While one can never be certain where obstacles will appear, or which aspect of an organization will become the target of a security breach, security analysis can help  to ease the burden by providing some insight into that areas of a business which are most vulnerable, thus allowing for pre-emptive measures to be taken.  This paragraph helps the student introduce the three methodologies that will be covered in this paper. Risk management and analysis is a somewhat subjective process, especially in  the world of business. Much like leadership and other such subjective processes, risk analysis has seen the development of a multitude of competing theories on how analyses can be best  and most accurately performed. At their core, all of the theories attempt to achieve the same end goal: giving business leaders a glimpse at the areas of their operations that  entail the greatest security liabilities; however, many of them differ in the principles they use to arrive at these assessments. This paper will address three of the most common risk  analysis methodologies: VSAT, Operational Risk Management, and the CARVER + Shock system. The first primary security methodology is VSAT, or the Vulnerability Self Assessment Test. It consists of eight 

    Back to Research Paper Results