wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Risk management in IT

profile
Khushi Yadav
Aug 25, 2022
0 Likes
0 Discussions
99 Reads

IT risk management is the application of risk management method to information technology in order to manage IT risk. i.e the business risk associated with the use, ownership , operation, involvement, influences,and adaptation of IT within in enterprise or organisation.

IT risk can be considered the components of a wider enterprises risk management system.

The established , maintenance and continuous update of an information security management  system ( ISMS) provide a strong indication that a company is using a systematic approach for the identification, assessment, and management of information security risk. 

Different methodology has been proposed to manage IT risk and ecah of them is divided into process or steps.

IT risk management is the application of risk management method to information technology to manage the risk inherent in the space.To do that means assessing the business risk associated with the use, operation, ownership and adoption of the IT in an organisation. Because risk is strictly tied to uncertainty in the business operation,decision Theroy should be applied to manage the risk as a science i,e rationality, making choices under uncertainty.

Risk is a critical criteria in the management of the Organisation is should be managed equivalently and appropriately in order to run the organisation smoothly and efficiently.


Comments ()


Sign in

Read Next

THE INPACT OF SOCIAL MEDIA!

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

HR Automation : Need of the hour

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Mumbai

Blog banner

Women empowerment

Blog banner

Memory Management

Blog banner

What is Internet

Blog banner

MODERN OPERATING SYSTEM

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

About myself

Blog banner

(Input/Output) in os

Blog banner

The Difference Between Plaque and Tartar Explained Simply

Blog banner

Amazon

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

EMAIL INVESTIGATION

Blog banner

Memory management

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Semaphores

Blog banner

Starvation

Blog banner

Operating system

Blog banner

Virtualization

Blog banner

GraphQL

Blog banner

Harsh Rathod

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

Malicious softwares

Blog banner

SMARTSHEET

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

Different memory allocation strategies

Blog banner

Music helps reduce stress

Blog banner

Process Description

Blog banner

IOT Hacking Techniques

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

Modern operating system

Blog banner

Europe Through My Lens

Blog banner

Multiprocessor and Multicore Organization

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner