Data is an asset for a person. It contains useful information personal information (Bashaand & Ameen, 2012). So, risk management of data is very important and is an audit of the computer in order to access the discovered vulnerabilities and to take steps for managing loss. As far as asset identification of my personal computer is concerned, the assets comprise of personal computer hardware, operating system, the software, data that I have created, and accessed networks.
My personal computer hardware is identified by the manufacturer, type, model, location, serial number, computer address i.e., Internet protocol, media access control etc and other unique information that is known for identifying the hardware. Following is my PC hardware asset identification.
In threat identification various threat agents are identified. The agents include theft, vandalism, and Operating system failure, human error, compromised systems and natural disaster. The threat identification of my Personal computer is as follows.
Vulnerability appraisal allows determining the security threats (Ciampa, 2011, p. 541). It allows me to have a glimpse on the security state of my personal computer. This can be done by examining inaccurate configurations; lack of the wireless security e.g., the Wi-Fi is not protected and other improper settings of hardware. But, in my case I believe that I have not addressed any kind of vulnerability as my personal computer is very well protected. Further, risk assessment involves determining the damage that can occur due to the attack and the risks associated because of vulnerability (Hester & Harrison, 1998, p.2). The risk assessment of my personal computer is as under.
As far as risk mitigation is concerned I have used encryption key on my access point of wireless that allows my network to remain protected. I have also configured personal/private firewall i.e., Stealth mode in order to protect the system from the attackers by disallowing unauthorized applications, services and programs from accepting the incoming connections that are not in my knowledge. In case of leaving home I keep my Macbook hidden and while travelling I keep my Macbook bag with me all the time. I have installed Find my Mac feature on my portable Macbook, which helps to track the system with the help of global position system.
In nut shell, I have not uncovered major vulnerabilities in my risk management study of personal computer. The risk feeling arises from vulnerability insecurity that is identified. By taking steps for identifying vulnerabilities, assessing risk and creating a plan in order to mitigate the risk one can protect his/her personal computer from threats.
References
Bashaand, R., & Ameen, J., (2012). Tele-market Modeling of Fuzzy Consumer Behavior. International Journal of Computers and Communications, 1(6), 1-91.
Hester, Ronald E., & Harrison, Roy M. (1998). Risk Assessment and Risk Management. The Royal Society of Chemistry, UK.
Ciampa, Mark D. (2011). Security+ Guide to Network Security Fundamentals (4th ed.). Cengagae Learning, United States of America.