This website uses cookies to ensure you have the best experience. Learn more

Risks And Potential Impact Relating To Security, Auditing And Disaster Recovery

600 words - 2 pages

Introduction"Risks are the potential consequences of events or conditions that can adversely affect an organization's operations and revenues, as well as its relationships with communities, business partners, suppliers, and customers" (Erbschloe, 2003).Executive SummaryThe organization selected for this paper is a Christian bookstore that sells books, CDs, DVDs, as well as miscellaneous items. Bookstore customers include walk-in's and organizations requiring larger orders. Contracts are made with some of these organizations due to the large volume of orders. Organizations include churches and the educational realm like private schools and home schoolers.Store Location and DescriptionThe bookstore is located within 3 blocks of the river flowing through town and is inside a strip mall. This area is prone to flooding but also is in an area known as 'tornado alley.' The store has 1000 square feet and a selling space of 650 square, with approximately 2500 books on the shelves. Since the bookstore is located within a strip mall, only one wall is made of part glass and part brick.Asset and Function WeightsThe weights listed below denote the importance of each asset or function to the organization. For this paper, it is understood the bookstore should have proper insurance coverages in place. Photographs of the interior and exterior will be on file with the insurance company and at an offsite location. System backups are also secured at an offsite location. Additionally, approaches to the elimination and minimization of the risks are suggested.Risk rating is as follows: 5 - Very High Risk; 4 - High Risk; 3 - Medium Risk; 2 - Low Risk; 1 - Very Low RiskTABLE 1 - SECURITY RISK ASSESSMENTAssets &FunctionsWeightHuman ErrorViruses, WormsTheft of Property / InformationHackers Approaches forElimination and MinimizationServer0.55525Store in safe place, assign levels of employees, monitor.Network0.52115Use firewall policy, set permissions, update regularly.Internet / Intranet0.43513Use encryption, authentication, & transactional security; PolicyInformation / Data0.45555Label files, use passwords, lock room.PCs / Laptops0.34555Use virus protection, lock room.TABLE 2 - DISASTER RISK...

Find Another Essay On Risks and Potential Impact Relating to Security, Auditing and Disaster Recovery

Testing and Maintenance of Disaster Recovery Plans

2307 words - 9 pages Continuity & Emergency Planning, 7(1), 56-64. Retrieved from http://www.henrystewartpublications.com/jbcep Coombs, W. T. (2008). PSI handbook of business security: Securing the enterprise. Westport, CT: Praeger Security International. Epstein, B., & Khan, D. C. (2014). Application impact analysis: A risk-based approach to business continuity and disaster recovery. Journal of Business Continuity & Emergency Planning, 7(3), 230-237. Retrieved from

Identifying Potential Risk, Response, and Recovery

1817 words - 7 pages With identifying potential malicious attacks, threats, and vulnerabilities, measures need to be taken to deal with the malicious activities. A strategy is needed to deal with each of the risk of the malicious attacks and threats in the previous memo. Also controls will need to be setup to help mitigate those risks of the attacks. A strategy and controls need to also be setup to mitigate each of the vulnerabilities from the previous memo to help

China's Latent Economic Crisis and Potential Risks

5581 words - 22 pages financial dimensions of China's economy so as to reveal its real conditions.1. Potential Risks associated with a Latent Economic Crisis1*Ms. HE Qinglian is a visiting scholar at the University of Chicago. She left China unannounced in June 2001 in the face of widespread, government-sanctioned harassment of scholars. She is the author of two books: We Are Still Watching the Stars Above (2001) and China's Pitfalls (1998). Both document the dark side of

Security Risk Management SRM and Auditing

1022 words - 4 pages the whole organization, not just from the IT department. The importance of IT security auditing is paramount in the organization. The risks involved in inadequate protection includes disclosure of business secrets to unauthorized parties, wrong information leading to wrong decision making, loss of access when required and decrease in competitive advantage. Hence, IT security audit with management support will lead to identification of threats in

Role of Investment Banking and its potential risks to real economy

1679 words - 7 pages Part B: Role of Investment Banking and its potential risks to real economyIntroductionInvestment banking is another service besides commercial banking that plays an important role in the world of finance and globalization nowadays. It provides some services such as underwriting or advisory to help company increasing funds or dealing with merger and acquisition. This part will give an overview about investment banking sector as well as its main

Vulnerability assessment of the company system and recommendations on measures to mitigate or eliminate potential risks

1339 words - 6 pages 3. REPORT OF IDENTIFIED RISKS 3.1 Identification of risks in the system and/or security vulnerabilities Risks or security vulnerabilities identified in Dynamic company systems include: 3.1.1 Physical location of web servers is easily accessible by employees The company has insufficient physical controls protecting equipment as the location of web servers are easily accessible by employees. According to Landoll (2011:312) humans pose a

Vulnerability assessment of the company system and recommendations on measures to mitigate or eliminate potential risks

1214 words - 5 pages how they operate and the vulnerabilities or risks that they can address in the protection of passwords. Rouse (2006) refers to this step as the identification of potential threats to each resource. 2.2.1.7 Run vulnerability scans Vulnerability scans can be run after understanding and mapping out company network infrastructure, applications, data flows and hardware, including security or protections needed . A security company that is well

Vulnerability assessment of the company system and recommendations on measures to mitigate or eliminate potential risks

1167 words - 5 pages 2.3 Vulnerability assessment tools Vulnerability assessment tools are a requirement for a successful vulnerability assessment as indicated in item 2.2 above (Perry nd). Security assessment tools detect and stop malware and any other attempt to crack computer systems. They are categorised into network security assessment tools and Web security assessment tools. Network vulnerability scanning focus on both sides of the firewall, within and

Genetically Engineered Crops are an Improvement and Potential Disaster

2460 words - 10 pages Genetically Engineered Crops are an Improvement and Potential Disaster Worldwide, more than one billion people are plagued by hunger (Zalik). According to the International Service for the Acquisition of Agri-Biotech Applications, more than 800 million of those are malnourished. It also predicts that over the next fifty years the total amount of available farm land per person will be halved, meaning that global cereal yield will have to

How To Create A Disaster Recovery Plan

1834 words - 7 pages systems, applications, and business processes. 5. Prepare impact analysis on interruption on critical systems. Conduct Risk Assessment The disaster recovery planning team should work with the organization's technical and security person to determine the probability of each functional business units' critical systems becoming severely disrupted and to document the amount of acceptable risk the business unit can tolerate. For each

Applying Concepts Relating to Groups and Organizations

936 words - 4 pages catching criminals. I think that basically all personal data should be kept private, especially things like social security numbers and passwords. Gathering companies should not be allowed to sell any sort of personal information, because it is exactly that, personal. The only type of personal information that should be made public is the arrest or police record of individuals who are pedophiles. All data collection firms should be required to ask

Similar Essays

Organization It And Security Systems: Disaster Recovery

1148 words - 5 pages procedures and supply reminders from time to time which will ensure security is a priority. Each system should must condition for data backup as well as recovery. Backup relates to copying data at scheduled intervals, or continuously. Recovery refers to restoring data and restarting a system after it has been interrupted. An overall backup and recovery plan which prepares for potential disasters is referred to as disaster recovery plan. The

Database Backup And Disaster Recovery Essay

749 words - 3 pages SQL Server job information that needs to be restored as part of a total system restore” (2008). Disaster Recovery Plan Preparation for unforeseen events must include a backup and recovery plan. Should an event occur that requires a system recovery, the first step is to ensure that the threat is no longer active. That might mean repairing a surging electric outlet, replacing a dead hard drive, or blocking a port on a firewall that was used by a

Insurance And Natural Disaster Risks Essay

2047 words - 9 pages Insurance is a very important factor to attaining financial capacity in an economy. It is a very difficult concept that requires extensive knowledge of insurable interests, risk assessment and management. This essay seeks to provide an overview of insurance specifically on assessment, measurement and management of both man-made risks and natural disaster risks. The essay further highlights the formulas adopted in measuring man-made risks. In

Understanding Backup And Disaster Recovery Planning

601 words - 3 pages In an emergency situation, securing data is more important than securing money that’s in the building. You can easily recover money lost. But if it’s important data you’ve lost, it may be hard for you to get it back. And the consequences to this can cost you your business. To ensure you have your data protected, it is important to have backup and disaster recovery planning. This will allow your business to make the necessary preparations to