Assignment 1
Assignment 1
LEVEL: 4.1
LECTURER: Mr Ranganai
Risk assessment is, the process for assessing security risks varies depending on the needs of
an organization. It relies on the type of business operation, assessment scope, and user
requirements. Tech Link Zimbabwe offers a range of information technology services,
Including software development, data analytics, and information technology. It is medium
company around 30 to 90 employees. Its mission is to empower Zimbabwean businesses and
organizations to succeed through innovative technology solutions. More so its values are
customer centricity, innovation, collaboration and integrity. It can be conducted with the
following steps.
Introduction: This is the initial section of the report that sets the stage for the risk
assessment. It provides an overview of the purpose of the assessment, the organization being
assessed, and may briefly touch on the methodology used for identification.
Identification: Identifying your organization needs and critical assets in terms of technology
infrastructure is crucial for establishing a strong security direction. This initial step helps you
understand what you need to protect and guides your security strategy.
Vulnerability Assessment: we evaluated the like hood and potential impact of each threat.
Risk Prioritization: we prioritized risks based on their likelihood and potential impact.
Human Error
Un intentional actions or mistakes made by individuals that can compromise the security,
integrity or availability of information systems or data. For example, accidental deletion of
data, misconfigured systems, and weak passwords. This can have led to a negative impact
which is Data loss, system downtime and financial loss Furthermore, to have a solution in
this is to provide regular training and awareness programs for employees. In addition,
develop and enforce strict procedures and guidelines.
Natural disaster
A natural event such as a flood, fire earthquake that can damage or destroy information
systems, data or infrastructure. For example, Server rooms flooded, data centres destroyed in
a fire in a fire and due to earthquake damage. This is prone to vulnerability which are
inadequate backup systems, insufficient disaster recovery planning. Hence there are negative
impacts which are business disruption, data loss and financial loss. A proposed mitigation
strategy is developing a comprehensive disaster recovery plan and implement redundant
systems and backup infrastructure.
Reputation Damage
This harm to an organization’s reputation, trust and credibility due to actual or perceived
security incidents. For example, negative media backlash loss of customer trust and damage
to brand reputation. To eliminate these crisis, develop a crisis management plan and
communication strategy and establish a social media monitoring and response.