As the rapid development of information technology, construction project enters information age. With the increasingly fierce market competition, the risk of information security is gradually looming large. From the project feasibility study, project proposal to the preliminary design, to construction stage, frequent data exchange is required. The crucial data of the project design and the blueprint are easy to be stolen, tampered with, lost and damaged, therefore, leading to an irreparable loss. Without protection from these security risks, the survival and development of enterprises cannot be guaranteed. As a result, the enterprises need to improve the level of management.The research aim of this paper is information security and risk management. Initially, the author discusses the background, significance and research method. The common information security and project management methods such as the questionnaire, process reengineering, SWOT analysis, Work Breakdown Structure, risk management are selected as the theoretical basis of this article. Four kinds of risk occurred during the process of project design are then analyzed. Information security technologies like double factor authentication and Active Directory are also covered in this part of the paper. It implicitly demonstrates the detailed procedure of risk identification, risk control and risk management which evidently provide foundations for the planning of risk protection, identification of key protections of enterprises.This study carries out a benefit analysis based on the investment cost of current information security risk management. Company N has invested approximately three million Yuan to upgrade the facilities, which are used to manage various risks among projects. In 2012 it has completed the design of 38 projects and the total income generated from the projects reaches up to eighty million Yuan which is fairly a fine result. At the end of the paper, the author constructs the future design of project risk management for company N in order to create a "Commercial Secret Network". Reasonable suggests towards project risk management are also presented. |