StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cis week 5 classwork class discussions - Assignment Example

Cite this document
Summary
Since most companies have confidential information about their customers, it is therefore a big risk if these data fall in the hands of hackers or people with malicious intentions.
This is a way of embracing technology…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful

Extract of sample "Cis week 5 classwork class discussions"

Risk Management Grade Emerging information technology security threat Data loss This is where companies loose valuable data through theft. Since most companies have confidential information about their customers, it is therefore a big risk if these data fall in the hands of hackers or people with malicious intentions.Internet attackThis is a way of embracing technology and by doing this; organizations are exposing themselves to global threats (Horn, 2009). Diligence should be taken to protect both the organizations and the customers.

Common response techniquesPolicies and user education programMost hacking is done through accessing employee’s password. It is therefore that organizations put up policies on how the company’s data should be accessed and by whom. The company should also educate their employees on the risks involved if they give their passwords to strangers or any other person.Secure points of entry and exitData is most vulnerable at the points where the computers of the company are connected to the outside world like the internet.

It is important that the IT managers to implement necessary defenses at these points (Murphy & Zwieback D, 2011).Implementation of content filtering technologyThis is where the company restricts the sites to be accessed by the employees since some sites are not secure and can be the source of threat attacks.Develop a relationship with law enforcersThe company should work in close relationships with local and federal enforcers of law since most of the hackers are organized criminals (Murphy & Zwieback D, 2011).

Steps required for recovery from attackIdentify the type of attackAnalyze the impact of the attackImplement proper systems to mitigate the threatsDoing the business impact analysisComparison and contrast of qualitative risk and quantitative risk analysisQualitative risk analysis is risk-level, easy and quick to execute, does not require any special tool or software and it is subjective in evaluating the probability and the impact of the risk. On the other hand quantitative risk analysis is project-level, consumes time, specialized tool may be required and it gives probabilistic estimates of time and cost.

Qualitative analysis is useful in projects which are small in nature and have less risk threat while quantitative risk analysis is useful in big projects which are prone to high threat.Mitigating RiskBusiness impact analysis being the determination of the impact an incidence can have, all the parties involved will be affected by one way or the other. People have to be compensated to their normal life they had from the incidence, and proper systems have to be in place to oversee that the incidence is totally mitigated.

Data should be kept proper as this will amount on the total costs incurred in the analysis and properties should be rebuild again and the owners given their title.ReferencesMurphy, & Zwieback D. (2011). Managing Emerging Security Threats. Retrieved on November, 5 2012 from http://www.greetsomeone.com/pdf/inkcom_managing_security_threats.pdf

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cis week 5 classwork class discussions Assignment”, n.d.)
Cis week 5 classwork class discussions Assignment. Retrieved from https://studentshare.org/information-technology/1607455-cis-week-5-classwork-class-discussions
(Cis Week 5 Classwork Class Discussions Assignment)
Cis Week 5 Classwork Class Discussions Assignment. https://studentshare.org/information-technology/1607455-cis-week-5-classwork-class-discussions.
“Cis Week 5 Classwork Class Discussions Assignment”, n.d. https://studentshare.org/information-technology/1607455-cis-week-5-classwork-class-discussions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cis week 5 classwork class discussions

Week 7 didcussion 1

The sex offender registration varies relative to week 7 Discussion How the courts perspective on the crime of sexual assault or sexual battery has changed over the years and what might be done to improve convictions and enforcement.... As a result of high profile on the crime concerning sex, the courts have taken a transformational perspective with regard to punishments, registration requirements, and defenses....
1 Pages (250 words) Essay

Common Misconceptions about Aging

Research a study on one aspect of aging and tell the class about it-be brief and cite your source.... Nearly 90 percent of those between 65 and 74 who participated in the study week One Discussion al Affiliation week One Discussion Discuss the societal misconceptions that older individuals have to deal with....
1 Pages (250 words) Assignment

Week 5 discussion 2

In light of this, it is crucial for state policy makers to ensure that education policies implemented account for the week 5: Discussion In my opinion, embracing diversity in the education system results in positive outcomes for both educators and their students.... Diversity in a state arises from the various cities that differ geographically from each other....
1 Pages (250 words) Essay

Week 5 disussions

The emerging approach is based on scientific findings that Week Five discussions Here Here Here Here Week Five discussions The divide between research findings and practical applications is not unique to the business world, as there is a noticeable lag between results and function that prevents knowledge of many types from being utilized to the human advantage (Nwagwu & Iheanetu, 2011)....
1 Pages (250 words) Book Report/Review

Week 5 discussion

owever, a significant challenge that may arise during the coaching process is lack of cooperation amongst the employees. The implementation process entails an employer week 5 Discussion week 5 Discussion Proper planning and execution of coaching efforts translates to high quality of output amongst employees....
1 Pages (250 words) Assignment

Class Discussion Week 12

The key elements of the pre-crisis plan include identification of crisis, Discussion week 12 discussion week 12 Lussier & Achua asserts that to be effectively prepared for any eventuality, strategic leader's responsibility is to set a pre-crisis plan.... This includes listing all the vulnerabilities to the organization and how to tackle them, and identifying other probable solutions… A team of a core group consisting of the Chief Executive Officer, organization's Public Relations people and legal counsel is assembled to undertake division and specialization of roles....
1 Pages (250 words) Essay

Class Management Plan

… The paper "class Management Plan" is a great example of an essay on management.... The class management plan includes systematic and strategic steps that should be taken by a teacher in ensuring a smooth flow of teaching sessions and interaction with students (Cipriani, 32).... The paper "class Management Plan" is a great example of an essay on management.... The class management plan includes systematic and strategic steps that should be taken by a teacher in ensuring a smooth flow of teaching sessions and interaction with students (Cipriani, 32)....
6 Pages (1500 words) Essay

Models of Casework Intervention

… The paper "Models of Casework Intervention" is a great example of a case study on social science.... nbsp; Jane is a 32-year-old female divorcee who works in a local supermarket.... She was arrested after an intense argument with her boyfriend of six months and brought in for assessment because she expressed suicidal ideation in the presence of the police....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us