Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity

Table Of Contents

1.0 Introduction
1.1 General /Background
1.2 Problem Statement
1.3 Research Question(s)
1.4 Objective and Purpose of the Research
1.5 Target Audience
2.0 Theoretical Framework
2.1 Review of appropriate literature
2.2 Information Security Overview
2.3 Information Security Model
2.3.1 Availability
2.3.2 Integrity
2.3.3 Confidentiality
2.3.4 Authentication
2.4 Information Security Management System
2.5 ISO Standards of Information Security Management System (ISMS)
2.6 Information Security Management Policies
2.6.1 Access Control
2.6.2 Email Usage Policy
2.6.3 Internet Usage Policy
2.6.4 Password Management Policy
2.6.5 System Usage Policy
2.6.6 Incident Handling Policy
2.7 Risk
2.8 Operational Risks and its Types
2.9 Operational Risks in Financial Organizations
2.10 Operational Risk Management
2.12 Impact of Operational Risks on Business
2.12.1 Reputation Loss
2.12.2 Financial Loss
2.12.3 Business Demolish
2.13 Management Commitment and Involvement
2.14 Conceptual Framework
3.0 Research Design/Methodology
3.1 Choice of Topic
3.2 Research Approach
3.3 Research Process
3.4 Data collection and source
3.5 Method critique
3.6 Sampling Strategy
3.7 Design of Questionnaire
3.8 Data Analysis
3.9 Framework of Methodology
4.0 Empirical Study
4.1 Interview Guide
4.2 Findings
4.2.1 NCCPL
4.2.1.1 Operational Risk
4.2.1.2 Information Risk Management
4.2.1.3 Structure of Organization
4.2.1.4 Operational Risk and Threats
4.2.1.5 Management Commitment and Involvement
4.2.1.6 Impact of operational risks on business
4.2.2 CDC
4.2.2.1 Operational Risk
4.2.2.2 Information Risk Management
4.2.2.3 Structure of Organization
4.2.2.4 Operational Risks and Threats
4.2.2.5 Management Commitment and Involvement
4.2.2.6 Impacts of Operational Risks on Business
5.0 Analysis
5.1 Operational Risks related to Information Security
5.2 Impact of Operational Risks on Business
5.3 Top Management Involvement and Commitment
5.4 Solutions to enhance Information Security
6.0 Conclusion
7.0 Recommendations
References
APPENDIX I
APPENDIX II
APPENDIX III
APPENDIX IV
0 of .
Results for:
No results containing your search query
P. 1
Operational Risks

Operational Risks

Ratings: (0)|Views: 23|Likes:
Published by Ernest Tetterfio

More info:

Published by: Ernest Tetterfio on Feb 26, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/22/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 23 are not shown in this preview.
You're Reading a Free Preview
Pages 27 to 66 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->