StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Risk and Security - Essay Example

Cite this document
Summary
This means that businesses need to keep abreast of the latest technological developments happening in the field of business; otherwise, they will soon become outdated and will lose their competitive edge. Keeping up to date with…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Risk and Security
Read Text Preview

Extract of sample "Risk and Security"

Risk and Security AFFILIATION: Risk and Security The current era is that of fast information flow. This means that businesses need to keep abreast of the latest technological developments happening in the field of business; otherwise, they will soon become outdated and will lose their competitive edge. Keeping up to date with technology is not always a safe journey. It has its pros and cons. Very often this information is misused by some individuals. Potential Security ThreatsSome of the potential security threats for this company are as follows:Any employee can code significant parts of the management information system or place a password on these and use it to dictate his or her terms.

Those having access to financial information can commit frauds and embezzlements (Shaw, Ruby, & Post, n.d).The information can also be leaked by means of e-mail, instant messaging, and peer-to-peer and remote access. Besides these, the usage of portable storage devices can also result in a leak (Gordon, 2007).Strategies to Minimize these Threats The first step in mitigating the security threats is to know about all the possible threats that an information system is vulnerable to.Firstly, a company can train its employees not to reveal information in any way possible.

They need to be informed about the probable dangers of revealing this information. Next, policies should be developed to make sure everyone follows the set principles. A process should be defined for retrieving and archiving the documents containing confidential information (Zurich, 2008). ConclusionIn a nutshell, technology has its own merits and demerits, and for companies to avoid information security breach, it is necessary that risk assessment be done properly (Elky, 2006).ReferencesElky, S. (2006). An introduction to information system risk management.

Retrieved from http://www.sans.org/reading_room/whitepapers/auditing/introduction-information-system-risk-management_1204Gordon, P. (2007). Data leakage – threats and mitigation. Retrieved from http://www.sans.org/reading_room/whitepapers/awareness/data-leakage-threats-mitigation_1931Shaw, E. D., Ruby, K.G., & Post, J.M. (n.d). The insider threat to information systems. Retrieved http://www.dm.usda.gov/ocpm/Security%20Guide/Treason/Infosys.htmZurich (2008). Strategies for managing information security risks.

Retrieved from http://www.zurichna.com/internet/zna/SiteCollectionDocuments/en/media/inthenews/strategiesformanaginginformationsecurityrisks.pdf

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Risk and Security Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Risk and Security Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/business/1603027-risk-and-security
(Risk and Security Essay Example | Topics and Well Written Essays - 250 Words)
Risk and Security Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/business/1603027-risk-and-security.
“Risk and Security Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/business/1603027-risk-and-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Risk and Security

Creating an Emergnecy Service Delivery Operation

Creating an Emergency Service Delivery Operation Date Creating an Emergency Service Delivery Operation In creating an emergency services delivery operation, I will have to consider having a combination of the career and the volunteer individuals.... hellip; Reasons as to why I choose this are the financial constraint....
3 Pages (750 words) Essay

Important certifications / Eight types of people responsible for security

Important certifications / Eight types of people responsible for security Important certifications / Eight types of people responsible for security Author Author's Affiliation Date Essay 1 Question 1: What are some of the most important certification programs available to network security professionals?... hellip; There are a large number of information security certification programs that are designed to test the knowledge of information security professionals in specific areas....
3 Pages (750 words) Research Paper

Benchmark Risk Management in Australia the UK and USA

Geographic Scope United Kingdom, United States of America and Australia Summary of Best Practices related to Risk Management of Physical Assets and Infrastructures Integration of security and safety plans and strategies, so as to ensure that the whole system operates with full force and concentration.... These physical assets might include security check points, railway stations, heavy traffic points, hospitals, shopping malls and etc.... risk MANAGEMENT PRACTICES IN RELATION TO PROTECTION OF PHYSICAL ASSETS BY POLICE DEPARTMENTS IN UK, USA AND AUSTRALIA Research Scope The scope of this research includes a comprehensive review of police departments' best practices in relation to management of risk related to physical assets....
7 Pages (1750 words) Research Paper

Concept of Risk in the Security of Liberal Government

It is argued that with the passage of time, the overall nature and orientation of the concept of Risk and Security has... The intertwined linkages between the international politics and terrorism has further magnified the role of security as one of… Almost every modern and developed nation is part of the war on terrorism however, at the same time; most of these States are also facing a great risk.... What is however, critical to note that after the cold war era, the overall focus from assessing the dangers to the security to the overall risks that may be arising out of the changing situation?...
10 Pages (2500 words) Essay

The Analysis of the Information Communication Technology

hellip; That said it is vital to recognize that information communication systems are subject to serious vulnerabilities and threats that can have adverse effects on business, government or Some of the many risks that are associated with information technology include, budgetary risk, program management risk, inventory risk, supply chain risk, investment risk, safety risk, legal liability risk, and security risk just to name a few.... A health care company would like to do a review on ACMEs security program, including its procedures, and security policies....
5 Pages (1250 words) Assignment

Hauffman Trucking Company

Managing Risk and Security: The safeguard of long-term success for logistics service providers.... With companies diversifying and setting up shop around the world, there are several positive and negative effects of globalization on the financial decisions of organizations.... Globalization allows the company… The company enters new markets and attracts new investors who contribute to the growth of the company....
1 Pages (250 words) Essay

Impact of Legislation on Organizations

Points of Analysis The procedures highlighted an analysed below necessitate the need for universal intelligence about Risk and Security management of data and information.... This review concerns the analysis of the security frameworks put in place by the Department of Health and Human Services in the United States.... The… The points of analysis for this particular case retrieves its items from the Executive Order (EO) 13636 Improving Critical Infrastructure Cyber security Impact of Legislation on Organizations al Affiliation: Introduction The organization under review with regards to its information security program is the Department of Health and Human Services....
2 Pages (500 words) Essay

Arguments for and Against Outsourcing Computer Security Services

One of the many reasons that a firm should outsource computer security services is the costs involved with… There are numerous costs associated with this, including costs of the IT infrastructure necessary, technical support, training, software licenses, and costs of compliance with public authorities, not to mention operations and The paper "Arguments for and Against Outsourcing Computer security Services" is a delightful example of an essay on information technology....
3 Pages (750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us