There are a variety of risks that a business organization faces when it comes to the implementation of a secure information technology system. This includes loss of information, an attack by internet or computer viruses and malwares, authorized use of data, etc (Vladimirov, Gavrilenko and Michajlowski, 2010). This paper analyzes the various elements that would make the computer system of a business organization to be vulnerable. It also examines the various measures aimed at protecting the computer system of a business organization.
A secure computer system must comprise of three major elements, namely recovery, resilience, and contingency (Calder and Watkins, 2010). Under resilience, the critical functions of a business organization and its supporting infrastructure are engineered and designed in a permanent manner. They are designed in a manner that it is impossible for any disruption to affect the functionality of these systems (Bradley and Carvey, 2006). It makes it likely for an organization to maintain its operations in case of a major threat or attack to its computer systems. For instance, a business organization may develop power back up systems, to protect the loss of data or their computer networks from going off, in circumstances where power fails to occur (Harrington, 2005). Business organizations may use solar gadgets and generators to protect their computer systems, in circumstances whereby power may fail.
Recovery involves restoring the important features of a computer system or network that failed to function (Bradley and Carvey, 2006). Computer experts may make arrangements aimed at recovering lost data, and making replacements on areas that is needed. This is to ensure that the activities of the business organization are not interrupted in any negative manner (Oppliger, 2000). Contingency involves ...
Cite this document
(“Security Risk Assessment Coursework Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.net/information-technology/695959-security-risk-assessment
(Security Risk Assessment Coursework Example | Topics and Well Written Essays - 1500 Words)
“Security Risk Assessment Coursework Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.net/information-technology/695959-security-risk-assessment.
Advancement in technology has resulted to the development of innovative computing systems which have facilitated the functions of various organizations and institutions. The increasing complexity of information systems has resulted to information security threats which have infringed the right of individuals to privacy of information.
nal data and information. It secures its confidentiality, accessibility and reliability. The role of information security for allowing access to the stored data and information on computer databases has augmented significantly over the past few decades. Additionally, a lot of businesses now store more and more customers and business data on computer systems that was not seen formerly.
This stage involves the collection of information regarding the imminent hazards associated with proposed solutions. The case presented in the Genericville City, needs insightful assessment of the risks involved through the use of Malathion in curbing the imminent mosquito nuisance.
Inadequate handling of risks in such patients may not only lead to incidence of violence in in-patient scenarios but also escalate into such violent and mal adaptive patients' behaviour in community settings. In addition such patents tend to develop conditions like Acute Traumatic Stress Disorder (ATSD) or Post Traumatic Stress Disorder (PTSD) which makes them more dysfunctional and less adaptive to normal behaviour patterns.
When migrating to an email system that is cloud-based, updating security strategy would be important to avoid possible risks associated with the increase concern on hosted email services due to the associated benefits. This could be done by weighing the email services.
Windrush ventures should see that it does not locate its data centre in the earthquake or flood-prone areas. Windrush Ventures has made no precautionary steps for those older and skilled employees who were about
Despite the fact that the wireless networking provides numerous advantages, it is also coupled with various security threats which can alter an organization’s overall security profile. In the case of the wireless network bridge, there is need for effective management to the threats linked with wireless technology. Thorough and sound assessment of the risk provided in the environment should be done in order to develop a plan to mitigate it.
Risk methodologies generally provide laid down procedures or steps used to determine and manage the occurrence of unpredicted events. There are various risk assessment methodologies available and include:
4 Pages(1000 words)Coursework
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Coursework on topic Security Risk Assessment for FREE!