Risk Managment Assessment and control

.pdf

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

430

Subject

Information Systems

Date

May 14, 2024

Type

pdf

Pages

6

Uploaded by irijah on coursehero.com

Risk Managment Assessment and control Rogue Construction Overview: Rouge Construction's mission is to build long-term relationships with both customers and the community through quality construction support services delivered by highly qualified experts. Purpose/Scope: The vision we have in place is to expand our construction support services to the entire state of kentucky by using servant leadership philosophy and practices Corporate requirements: For rogue construction we follow a set of workplace safety law. Osha closely tracks commercial construction sites. Scaffolding, enclosed spaces, and hazardous chemicals used during the construction process fall under OSHA's mandate. Workplace injuries require legal services and insurance so no issues arise. Categories: Databases: Using databases that is in corporate setting will allow for the storing and retrieval of the data. For anything with sensitive information, such as records of medical, anything financial can be maintained in the database with any security rules in place to allow access to the consumers for their records on file. Clients: Things that can be included in anyform of gadget that will provide connectivity to the internet or even a companies network. Examples of those devices can be computers, laptops, mobile gadgets and even tablets. Operational software: This will enable the devices to communicate with one another done through the internet. The clients will have their own OS depending on what device is being used. As well as extra business software memebership admin.
Confidential IP: The IP is a unique data, mixed with the algorithms and services that will tell rogue construction apart from the other construction sites. This piece of information is for no one to see but our company because its our little secret. Security devices: These devices would be installed in the network components and the databases will have to improve the security overall. Also, we should have the proper equipment that will protect you from the security of the data of the customers when it travels all across the network. Internet Components: Easy to set up consultations and quotes online for consumers to request our service. If you are a high value customer apart of the company will have access to the network to look at rules, regulations, and any guidelines for our company. Security Software: This component is vital to any online data company. If you dont have the right and proper security, your firm or any firm might be in jeapordy for any one wanting our services. All consumers information can be lost. You will need to install a anti virus software. Classification method: This will be a wide range mix of confidential and restricted access and data. The ones being affected would be the company rogue construction and its clients. The confidential portion will be for rogue construction and the restricted portion will be for the guests and loyal customers of our company. Part 2:
Part 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help