Assessment of Risk Management and Control Effectiveness at Cincom Systems

1581 Words6 Pages
Assessment of Risk Management and Control Effectiveness at Cincom Systems
Introduction
Based on the Information Asset Inventory and Analysis completed for Cincom Systems the next phase of improving their enterprise security management strategy is to concentrate on assessments of risk management and control effectiveness. This specific study evaluates the effectiveness of the security technologies and methodologies in place at Cincom, also determining uncertainty and calculating the risk of the most dominant threats. Additional security requirements are need to fully protect Cincom's information assets. These are evaluated from an administrative, managerial and technical control standpoint. The network security methodology and technology used by Cincom is also assessed in addition to the access control technologies used. This analysis concludes with a discussion of what was learned and how this assignment has changed my perceptions of security technology and methodologies.
Assessing the Effectiveness of Cincom Security Methodologies and Use of Technology
The security methodologies Cincom relies on are predicated on the trade-off of information and knowledge agility relative to hardened and escorted database architectures that met necessary U.S. Department of Defense (DoD) and foreign government requirements. Balancing information access and agility of business processes relative to database security, role and biometric-based authentication, in addition to asset

More about Assessment of Risk Management and Control Effectiveness at Cincom Systems

Get Access