wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Risk management in IT

profile
Khushi Yadav
Aug 25, 2022
0 Likes
0 Discussions
99 Reads

IT risk management is the application of risk management method to information technology in order to manage IT risk. i.e the business risk associated with the use, ownership , operation, involvement, influences,and adaptation of IT within in enterprise or organisation.

IT risk can be considered the components of a wider enterprises risk management system.

The established , maintenance and continuous update of an information security management  system ( ISMS) provide a strong indication that a company is using a systematic approach for the identification, assessment, and management of information security risk. 

Different methodology has been proposed to manage IT risk and ecah of them is divided into process or steps.

IT risk management is the application of risk management method to information technology to manage the risk inherent in the space.To do that means assessing the business risk associated with the use, operation, ownership and adoption of the IT in an organisation. Because risk is strictly tied to uncertainty in the business operation,decision Theroy should be applied to manage the risk as a science i,e rationality, making choices under uncertainty.

Risk is a critical criteria in the management of the Organisation is should be managed equivalently and appropriately in order to run the organisation smoothly and efficiently.


Comments ()


Sign in

Read Next

social media issue

Blog banner

Zomato (Income Sources)

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Article on different management system

Blog banner

Process State

Blog banner

Network Footprinting in Cybersecurity

Blog banner

INTERNET

Blog banner

Music helps reduce stress

Blog banner

Health is Wealth

Blog banner

RAID - LEVELS OF RAID

Blog banner

Europe Through My Lens

Blog banner

Memory Management in an Operating System

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

A buffer overflow

Blog banner

Population

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Zero-Day Attack

Blog banner

FAMILY WHERE LIFE BEGINS....

Blog banner

Open Source Project By Google

Blog banner

Types of E-Commerce

Blog banner

Multithreading in Operating System

Blog banner

Old age lifestyle

Blog banner

IP ADDRESS

Blog banner

INTRODUCTION TO C#

Blog banner

Deadlock and Starvation

Blog banner

Data Science & AI

Blog banner

Life of a 2020-2021 student

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

Zoho

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

Is Your Password Complex Enough?

Blog banner

How can parents support a child’s mental health?

Blog banner

File management in os

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Security Issues and Countermeasures

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Ethical Hacking

Blog banner

Importance Of Yoga.

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Memory management

Blog banner