Running Head: RISK, THREAT AND VULNERABILITY MANAGEMENT 1 RISK, THREAT AND VULNERABILITY MANAGEMENT 2 Risk, Threat and Vulnerability Management 1. Introduction A general review of threats and vulnerabilities on IT systems was carried out by an American based company known as Para Delta that deals with information technology and sells electronic software. This was done in order to assist the firms to come up with effective security control measures which reduce the risk and threats on the IT networks. Para Delta Company developed procedures through which threat and vulnerability can be managed. The management steps provide emphasis on advance action of network security tasks such as insertion testing. Some automatic systems have advanced antivirus software installed in them, which are not able to identify the specific security threat and vulnerability even though they are capable of detecting dangers. The Para Delta came up with solutions to these threats by creating a threat intelligence foundation that combines human capability and data-driven intersection. Cyber-attacks and risk management are done by first assessing vulnerabilities that help to identify the common threats and the magnitude of their effects on the manufacturing environment. The right set of security arrangements and risk management procedures are required to avoid cybersecurity vulnerabilities that pose serious threats to IT networks. The company found out that there is a need to develop guidelines and techniques which avail adequate information security to secure the operating system. By protecting the information and information systems create an affirmative foundation for strong information. This initiative helps to mitigate risks on the IT networks by protecting it from unauthorized access or destruction. Frameworks given by IT security procedures provide management to the information technology and governance. Frameworks also acknowledge IT governance objectives and good actions by the IT process. Companies are required to develop policies on the planning processes of information security systems, which again require plans of action for implementing security controls. This makes it possible for the provision of a more confidential information system and its availability. 2. The Analysis of Security Baseline The analysis was carried out by the Para Delta Company through the identification of various procedures, security requirements, the security attacks to the enterprise network control systems, and network infrastructure with security posture components. 2.1. Security requirements and goals The Para Delta Company carried out an analysis of security baseline through which the identification of various security necessities and results were listed for the preparation of any action of security baseline. The company found out that for strong networks of IT control system to be achieved.
Running Head: RISK, THREAT AND VULNERABILITY MANAGEMENT 1 RISK, THREAT AND VULNERABILITY MANAGEMENT 2 Risk, Threat and Vulnerability Management 1. Introduction A general review of threats and vulnerabilities on IT systems was carried out by an American based company known as Para Delta that deals with information technology and sells electronic software. This was done in order to assist the firms to come up with effective security control measures which reduce the risk and threats on the IT networks. Para Delta Company developed procedures through which threat and vulnerability can be managed. The management steps provide emphasis on advance action of network security tasks such as insertion testing. Some automatic systems have advanced antivirus software installed in them, which are not able to identify the specific security threat and vulnerability even though they are capable of detecting dangers. The Para Delta came up with solutions to these threats by creating a threat intelligence foundation that combines human capability and data-driven intersection. Cyber-attacks and risk management are done by first assessing vulnerabilities that help to identify the common threats and the magnitude of their effects on the manufacturing environment. The right set of security arrangements and risk management procedures are required to avoid cybersecurity vulnerabilities that pose serious threats to IT networks. The company found out that there is a need to develop guidelines and techniques which avail adequate information security to secure the operating system. By protecting the information and information systems create an affirmative foundation for strong information. This initiative helps to mitigate risks on the IT networks by protecting it from unauthorized access or destruction. Frameworks given by IT security procedures provide management to the information technology and governance. Frameworks also acknowledge IT governance objectives and good actions by the IT process. Companies are required to develop policies on the planning processes of information security systems, which again require plans of action for implementing security controls. This makes it possible for the provision of a more confidential information system and its availability. 2. The Analysis of Security Baseline The analysis was carried out by the Para Delta Company through the identification of various procedures, security requirements, the security attacks to the enterprise network control systems, and network infrastructure with security posture components. 2.1. Security requirements and goals The Para Delta Company carried out an analysis of security baseline through which the identification of various security necessities and results were listed for the preparation of any action of security baseline. The company found out that for strong networks of IT control system to be achieved.