Sunday, May 5, 2019

Identifying Potential Risk, Response, and Recovery Assignment

Identifying Potential Risk, Response, and Recovery - Assignment ExampleThey are battlefield to a multiple number of insecurities that could prove to be very disastrous for the business to which the system belongs should it yield to a threat. Businesses that rely on selective information systems earn an obligation to maintain and keep it secure. As the schooling Security Engineer for a videogame development company, it is compulsory that I adopt a vigilant greet to uphold my companys information security (Godbole, 2009). Attacks, threats and vulnerabilities to the organization Hacking The organization is vulnerable to hacking. Hacking is a nefarious act whereby unauthorized people with massive computer knowledge decide to illegally access the face-to-face information on anothers information system, mostly to use for malicious acts that will malign the systems owner. As identified, the organizations system is not secure enough to defend itself from hackers. Should this threat not be handled the organization is at a risk of losing its most valuable information to any wholeness who does not leave the business best interests at heart. Such information in the wrong pass on could lead to the downfall of the organization with extinct fail. Obsolescence The organizations information system is outdated. This is a threat that of necessity to be addressed. In a business as competitive as the videogames one cannot afford to have information systems that are out-of-date. ... This direction that the systems fail to work somehow due to various reasons. I have made an observation that once the systems crash all the information that was contained in it is lost and the organization has to arrive from scratch. It does not have to happen this way at all. This is a problem that must be dealt with so as to save time. If all activities in an organization will be stopped just because one system crashed then the business will lag lavatory (Godbole, 2009). Poor criminal ma intenance by module The organizations staff are not using the information systems a required. This could be out of ignorance or simply negligence. I recently observed one staff member pour pee on a computers keyboard. This is an outrageous show of poor maintenance. The systems need to be taken care of on the outside in order to protect the information they carry inside. Lack of maintenance could lead to a double tragedy, that is, irreparable damage to the computer systems and in turn loss of the selective information they hold. Theft There has been theft of information systems in the recent past o the organization. This is an attack that cannot be allowed to stand as it should be hazardous to the life of the firm. The organization should find out the source behind these threats and tackle it with immediate effect (Godbole, 2009). Strategies and controls to deal with the risks 1) Hacking Hacking can be dealt with using the strategy of risk avoidance. This means ensuring that it do esnt occur at all. For this strategy to be enforced the organization needs to apply parvenu methods of securing the information systems further. For instance, by creating stronger passwords for files. This will make it harder for a hacker to access whatever is

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.