Sunday, June 16, 2019

Identifying Potential Risk, Response, and Recovery Assignment

Identifying Potential Risk, Response, and Recovery - Assignment ExampleThey are subject to a multiple number of insecurities that could usher to be very disastrous for the business to which the system belongs should it succumb to a threat. Businesses that rely on data systems have an obligation to maintain and keep it secure. As the Information Security Engineer for a videogame development company, it is compulsory that I adopt a vigilant approach to uphold my companys development security (Godbole, 2009). Attacks, threats and vulnerabilities to the formation Hacking The brass instrument is vulnerable to hacking. Hacking is a criminal act whereby unauthorized people with massive computer knowledge decide to illegally admittance the personal information on anothers information system, mostly to use for malicious acts that result harm the systems owner. As identified, the organizations system is not secure enough to protect itself from hackers. Should this threat not be handled the organization is at a risk of losing its most precious information to anyone who does not have the business best interests at heart. Such information in the wrong hands could lead to the downfall of the organization without fail. Obsolescence The organizations information system is outdated. This is a threat that needs to be addressed. In a business as competitive as the videogames one cannot return to have information systems that are out-of-date. ... This means that the systems fail to work somehow due to various reasons. I have made an observation that once the systems come down all the information that was contained in it is lost and the organization has to commence from scratch. It does not have to happen this way at all. This is a problem that must be dealt with so as to save time. If all activities in an organization will be stopped just because one system crashed then the business will lag behind (Godbole, 2009). Poor maintenance by staff The organizations staff are no t using the information systems a required. This could be out of ignorance or simply negligence. I recently observed one staff member pour water on a computers keyboard. This is an outrageous show of poor maintenance. The systems need to be taken care of on the outside in order to protect the information they carry inside. lose of maintenance could lead to a double tragedy, that is, irreparable damage to the computer systems and in turn loss of the data they hold. Theft There has been theft of information systems in the recent past o the organization. This is an attack that cannot be allowed to stand as it should be hazardous to the life of the firm. The organization should find out the radical behind these threats and tackle it with immediate effect (Godbole, 2009). Strategies and controls to deal with the risks 1) Hacking Hacking can be dealt with using the dodge of risk avoidance. This means ensuring that it doesnt occur at all. For this strategy to be enforced the organization needs to apply new methods of securing the information systems further. For instance, by creating stronger passwords for files. This will make it harder for a hacker to access whatever is

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.