• 990-28产品经理:Different types of IT risk 不同类型的IT风险


    Your IT systems and the information that you hold on them face a wide range of risks. If your business relies on technology for key operations and activities, you need to be aware of the range and nature of those threats.
    您的IT系统和您在其中持有的信息面临着广泛的风险。如果您的企业依赖技术进行关键运营和活动,您需要了解这些威胁的范围和性质。
    Types of risks in IT systems
    Threats to your IT systems can be external, internal, deliberate and unintentional. Most IT risks affect one or more of the following:
    信息技术系统中的风险类型
    对您的IT系统的威胁可以是外部的、内部的、有意的和无意的。大多数IT风险会影响以下一个或多个方面:

    business or project goals
    service continuity
    bottom-line results
    business reputation
    security
    infrastructure
    Examples of IT risks
    业务或项目目标
    服务连续性
    底线结果
    商业信誉
    安全
    基础设施
    IT风险示例
    Looking at the nature of risks, it is possible to differentiate between:
    从风险的性质来看,可以区分以下几种风险:

    Physical threats - resulting from physical access or damage to IT resources such as the servers. These could include theft, damage from fire or flood, or unauthorised access to confidential data by an employee or outsider.
    Electronic threats - aiming to compromise your business information - eg a hacker could get access to your website, your IT system could become infected by a computer virus, or you could fall victim to a fraudulent email or website. These are often of a criminal nature.
    Technical failures - such as software bugs, a computer crash or the complete failure of a computer component. A technical failure can be catastrophic if, for example, you cannot retrieve data on a failed hard drive and no backup copy is available.
    Infrastructure failures - such as the loss of your internet connection can interrupt your business - eg you could miss an important purchase order.
    Human error - is a major threat - eg someone might accidentally delete important data, or fail to follow security procedures properly.
    物理威胁——来自对IT资源(如服务器)的物理访问或损坏。这些可能包括盗窃、火灾或洪水造成的损失,或雇员或外部人员未经授权访问机密数据。
    电子威胁-旨在损害您的业务信息-例如黑客可以访问您的网站,您的IT系统可能会被计算机病毒感染,或者您可能成为欺诈性电子邮件或网站的受害者。这些通常是犯罪性质的。
    技术故障——如软件错误、电脑死机或电脑组件完全失效。技术故障可能是灾难性的,例如,您无法检索故障硬盘上的数据,并且没有可用的备份副本。
    基础设施故障-如您的互联网连接的丢失可能会中断您的业务-如您可能会错过一个重要的采购订单。
    人为错误-是一个重大威胁-例如有人可能会意外删除重要数据,或未能按照安全程序正确。

    How to manage IT risks?
    Managing various types of IT risks begins with identifying exactly:

    the type of threats affecting your business
    the assets that may be at risks
    the ways of securing your IT systems
    如何管理资讯科技风险?
    管理各种类型的IT风险首先要准确识别:

    影响您业务的威胁类型
    可能存在风险的资产
    保护您的IT系统的方法

  • 相关阅读:
    GuavaCache学习三种过期策略的学习
    C# 通过子窗体刷新父窗体:窗体控制
    百度地图定位BMap.GeolocationControl的用法
    面试面经|java面试异常面试题
    02Java线程模型
    在Linux系统安装Kafka
    YOLOv5 PyTorch TXT label文件格式讲解
    futex_wait
    git撤回 不小心 commit 进去的文件
    Apache+PHP8+MYSQL的配置(目前最新版本)
  • 原文地址:https://blog.csdn.net/CSDNXXCQ/article/details/136435550