StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Companys Business Foundation and Deliberate Threats to Information Systems - Assignment Example

Cite this document
Summary
The reporter answers several questions, for example, what do you see as the three biggest threats to corporate cybersecurity that CSOs should be aware of? He says that CSOs should be aware of the type of corporate threats that undermine the existence and mission of their respective business models…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Companys Business Foundation and Deliberate Threats to Information Systems
Read Text Preview

Extract of sample "Companys Business Foundation and Deliberate Threats to Information Systems"

Case StudyWhat do you see as the three biggest threats to corporate cyber security that CSOs should be aware of?1. Company’s Business FoundationCSOs should be aware of the type of corporate threats that undermine the existence and mission of their respective business models. The business foundation of any for profit-company is comprised of information vital to the company as it includes the strategies and products the company deploys to secure competitive advantage. In this case, two primary threats associated with the foundations of business models include Espionage or trespass and Information Extortion.

These two threats to the foundation of a company are specific in threatening the company’s survival as both a sustainable entity and a competitive rival to other companies as well. In revelation of these threats, CSOs should be aware that rival companies and/or private groups can use espionage as a means to acquire the company information illegally. While the issue of espionage may be addressed as an external threat, in most cases, CSOs should be aware that internal activities exposing critical information to employees can lead to espionage.

This means that through illegal acquisition of that information, employees in firms can facilitate the damaging of the business foundation of the company by selling the information to rivals. Additionally, information extortion is another area where CSOs should be aware of when it comes to business foundation. In order to secure a company’s business foundation, the CSO should be aware that illegal access to information can lead to corporate blackmail. This process involves a hacker or a holder of sensitive information who agrees to give up information or not to disclose it for a fee.

The motive of information extortion is to create value by pointing out the possible losses that would be incurred if the information was accessed by rival companies Information (Security, pp. 103-104).2. Value of InformationCSOs must be equipped with the information regarding the value of the company data and how such information can be harmful if it was lost or accessed by unauthorized personnel. When CSOs are aware of the information value, two primary corporate cyber threats are considered.

Firstly, the CSO should be aware that information loss can result from sabotage and vandalism. Although companies do not have social enemies, they have financial rivals who thrive to push as many of their competitors out of business. By damaging or rendering a company’s information database unusable, a company is unable to move on as it has to accommodate all direct losses, law suits, and possible closures (Information Security, pp. 104-105).3. Targeted ResourcesAll business models have resources they make use of in order to sustain development and profitability.

Following this fact, CSOs should be aware that a company’s resources differ from one user to another but can be generally fatal. In this case, 3 areas are identified as corporate cyber-attack hotspots. Firstly, since companies use software to operate, software attacks aim at finding security holes in order to execute the attacking commands. Secondly, comprise to intellectual property is another area CSOs should be aware of as laws governing certain areas are not universally enforced and may expose intangible assets such as patents.

Thirdly, most publicly traded firms have shareholders as sources of capital. As a resource, shareholder or user details can be acquired maliciously and disrupting user/shareholder confidence with the company at hand. In order to protect resources, CSOs must ensure that they are aware of the types of threats potentially capable of disrupting competitive strategies of the business entity (Information Security, p. 105).Works CitedInformation Security. Deliberate Threats to Information Systems. pp.

103-108Works Cited

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Companys Business Foundation and Deliberate Threats to Information Sy Assignment - 8”, n.d.)
Companys Business Foundation and Deliberate Threats to Information Sy Assignment - 8. Retrieved from https://studentshare.org/information-technology/1681775-case-study
(Companys Business Foundation and Deliberate Threats to Information Sy Assignment - 8)
Companys Business Foundation and Deliberate Threats to Information Sy Assignment - 8. https://studentshare.org/information-technology/1681775-case-study.
“Companys Business Foundation and Deliberate Threats to Information Sy Assignment - 8”, n.d. https://studentshare.org/information-technology/1681775-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Companys Business Foundation and Deliberate Threats to Information Systems

Increasing Vulnerability of Organizational Information Assets

2005): Spoofing and sniffing Denial of service attacks Identity theft Question 2: Contrast unintentional and deliberate threats to an information resource.... However, these networks always remain the major target of attackers which can cause problems for organizations and attacks against information systems.... However, there are two major types of threats known as deliberate threats and unintentional threats.... nformation systems are vulnerable and in danger due to a number of possible threats and hazards....
7 Pages (1750 words) Assignment

Information System Security

he purpose of this study is to identify the role of risk management as part of the security model of modern information systems.... or the identification of the risks faced by modern information systems, the researcher identified and presented the most common risks and threats a modern information system faces today and how they have developed over time.... The researcher proceeds with a detailed analysis of the available technologies for risk reduction in information systems....
56 Pages (14000 words) Essay

Enterprise Risk Assessment, Audit, and Cyberlaw Policy

The company encrypts its file systems, encrypts stored data, and encrypts the entire wire transfers.... In the report, the company outlines some of the security trends and threats and then guide on how it can be fixed and prevented.... The purpose of the paper 'Enterprise Risk Assessment, Audit, and Cyberlaw Policy' is the assessment of the various risks that are associated with an interaction network that happens daily between the suppliers, investors, stakeholders, and employees while offering clear guidelines of conducting intentions to mitigate the risks....
8 Pages (2000 words) Case Study

Strategic Management and the Business Environment

Either the environment may give opportunities or threats to the company.... One is to take advantage of the industry opportunities and the other one is to protect the company from industry threats.... Industry threats could come in the form of more competition and therefore lower chances of profitability or greater chance of eventually losing business.... Hence, a strategic thinking manager should see to it that he would protect the company from industry threats....
17 Pages (4250 words) Essay

Factors That Are Contributing to the Increasing Vulnerability of Organizational Information Assets

However, these networks always remain the major target of attackers which can cause problems for organizations and attacks against information systems.... 2005):information systems are vulnerable and in danger due to a number of possible threats and hazards.... However, there are two major types of threats known as deliberate threats and unintentional threats.... The paper "Factors That Are Contributing to the Increasing Vulnerability of Organizational information Assets" describes that risk avoidance is the process of recognizing a risk as well as formulating a decision to no longer involving in the activities linked with that risk....
7 Pages (1750 words) Assignment

Risk Management Program for Data Mart

It is useful to designate a team or an individual, with a proper understanding of the business needs to continually participate in the management of information security risk.... The assigned team or the person is expected to work with other people from the organization to better understand the composition of the business program in view of the information assets alongside the technologies involved and risk-related issues such as costs and likelihood.... Asset classification would be necessary if an organization is interested in assessing its information risk....
44 Pages (11000 words) Capstone Project

Information Security the Using Business Impact Analysis

Information security is a method adopted in protecting information and information systems from any form of use, access, disruption among other aspects.... BIA will also help APS to respond, prepare, organize, and prepare for incidences, which may face the information systems at any time.... This report "information Security the Using Business Impact Analysis" discusses information security as an important aspect for the success of any given firm....
21 Pages (5250 words) Report

Information Security: Principles and Practice

As the paper "information Security: Principles and Practice" outlines, Project Management Body of Knowledge is an amalgamation of processes and knowledge areas.... Specialty cases of all the threats and information quality stored in the organization servers are also reviewed.... uring the analysis phase of SecSDLC, dedicated teams facilitate ensuring that valid initial analysis of all security plans or agendas, with their known threats, is unveiled....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us