Torrecampo Activity1 SemiFinalsAssignment

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

ARELLANO

UNIVERSITY
Andres Bonifacio Campus
Pasig

SCHOOL OF INFORMATION TECHNOLOGY EDUCATION


(SITe)
“Ducere qum Phronesis”

Name: TORRECAMPO, JONELLE MARK S. Student No: 19-00287


Subject/Course: ITC 128 - THURS Date Submitted: 03/12/2024

Reminder: use this document when writing your answers. Return this to your
class teacher via email either in MS-Word or .pdf format. Do not “share”, send
this as an email attachment.
Semi-Final Assignment
Discuss in your own words. Copy and paste not allowed.
1. Discuss three ways to minimize technology risk.
2. Discuss four types of IT Security.
3. Name and give the meaning of risk management tasks in software engineering.
Write your discussion here

I. Discuss Three ways to minimize technology risk

Organizations can use a number of strategic ways to effectively minimize technological


risks. Putting strong security measures in place should come first. Strict access controls
must be established, data protection measures such as encryption must be used, and
frequent security audits and monitoring must be carried out in order to identify and quickly
fix flaws.

Second, it's critical to cultivate an environment that values staff awareness and training.
Employees can learn about the most recent cyberthreats, how to avoid phishing scams,
and how to follow stringent security guidelines by participating in extensive security
awareness seminars. They can become more adept at identifying and thwarting possible
social engineering attacks by participating in simulated phishing exercises.

2. Discuss four types of IT Security

To protect digital assets and systems, IT security takes several forms. To begin with,
network security entails protecting data transmission and communication routes inside a
network. Application security, which focuses on shielding software programs from outside
threats and weaknesses, is an addition to this.

Information security also seeks to protect sensitive data by guaranteeing its availability,
confidentiality, and integrity. Protecting hardware, servers, and other physical assets from
harm or unauthorized access is a critical component of physical security. Together, these
four categories provide a thorough framework for IT security that addresses all facets of
the digital world.

3.Name and give the meaning risk management tasks in software


engineering.

In software engineering, project success is largely dependent on effective risk


management. Identifying any risks or uncertainties that could have an influence on the
project is the first step in risk identification. The next step is risk analysis, which involves
evaluating each detected risk's likelihood and possible impact in order to properly
prioritize mitigation activities.

Risk monitoring comprises ongoing observation of the project environment for new
hazards, whereas risk planning comprises creating strategies and backup plans to handle
possible problems. The final step in risk control is to carry out the intended methods,

“Whatever you do, do it for the glory of God”


1
ARELLANO
UNIVERSITY
Andres Bonifacio Campus
Pasig

SCHOOL OF INFORMATION TECHNOLOGY EDUCATION


(SITe)
“Ducere qum Phronesis”

Name: TORRECAMPO, JONELLE MARK S. Student No: 19-00287


Subject/Course: ITC 128 - THURS Date Submitted: 03/12/2024

make any necessary adjustments, and record the lessons learnt for use in subsequent
initiatives. When combined, these risk management activities provide software
engineering projects with an organized and pro-active method for managing uncertainty.

“Whatever you do, do it for the glory of God”


2

You might also like