Free

Risk Management and Security Threat - Essay Example

Comments (0) Cite this document
Summary
In the report, it is underlined that program risk can be defined as a measure of uncertainties that any aspect of a program will perform its required functions under the required schedule and performance constraints…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.9% of users find it useful
Risk Management and Security Threat
Read TextPreview

Extract of sample "Risk Management and Security Threat"

Risk Management and Security Threat Analysis
Program risk can be defined as a measure of uncertainties that any aspect of a program will perform its required functions under the required schedule and performance constraints. These program aspects include design process, performance indicators and operational needs.
Institutional needs can be defined as the probability that an organization will not be able to meet its organizational objectives thorough the available resources and constraints. Such risks may include systems failure, inability to meet program costs and system security breaches [Rob02].
The Department of Veterans Affairs has incorporated security measures into its risk management framework. In order to cater for program risk, the department has employed security experts who are competent enough to manage programs and risks associated with them. The department has also improved their detection systems as well as employing security measures such as use of strong passwords. One of the measures to cover institutional risk in the risk management framework is diversification of products and benefits to veterans[SOP14].
There exists some differences between the three reports. One difference is their content. One report is about the threats that come about with new technology platforms while the other is about the evolution of malwares to becoming smarter, shadier and stealthier. This happens when the malware authors develop more effective malware that can easily camouflage and go undetected by program users and owners. The second difference is that one report, the later report of 2014, is about the advancements made by malware developers and how malware has developed dangerously. The 2013 report is about how development and advancements in technology have opened up new opportunities for malware developers. This difference sensitizes web users that virtually all the internet segments are under risk. The third difference is that the 2013 report mentions android as one of the prime targets of malware and paints a picture that android is highly vulnerable while the 2014 report mentions the advancements made in malware that is targeted at android operating systems. This is significant in sensitizing users on the potential threats to android that exist. [SOP13].
The key threats should be addressed by developing more and better solutions to software security. This is because efforts against security threats can only be successful if the efforts are well ahead of the threats. Government should initiate programs that will encourage growth and development of antimalware. Professionals need to get smarter by the day. This is because if for every new platform there will be accompanying security measures, then the risks brought by security threats will be greatly reduced. The Department of Veterans Affairs employs experts, uses rapid detection systems and has discontinued the use of Java platform in their systems thus reducing chances of attack by malware [Dep14].
References
Rob02: , (Jazwinski, 2002),
SOP14: , (SOPHOS, 2014),
SOP13: , (SOPHOS, 2013),
Dep14: , (Department of Veterans Affairs, 2014), Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Risk Management and Security Threat Essay Example | Topics and Well Written Essays - 500 words - 39”, n.d.)
Risk Management and Security Threat Essay Example | Topics and Well Written Essays - 500 words - 39. Retrieved from https://studentshare.org/information-technology/1698877-writers-choice
(Risk Management and Security Threat Essay Example | Topics and Well Written Essays - 500 Words - 39)
Risk Management and Security Threat Essay Example | Topics and Well Written Essays - 500 Words - 39. https://studentshare.org/information-technology/1698877-writers-choice.
“Risk Management and Security Threat Essay Example | Topics and Well Written Essays - 500 Words - 39”, n.d. https://studentshare.org/information-technology/1698877-writers-choice.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Risk Management and Security Threat

Topic:: Security Risk Management

...that Risks are Mitigated and Crises faced by an organization is Managed (United Kingdom Parliament, 2006). II. Security Risk Management Since September 11, 2001, decisions for security risk managers have become even more difficult. The terrorist threat potential, that is, the likelihood of an attack, motivations, and capabilities, has dramatically increased (Biringer, Matalucci, & O'Connor, 2007). The event was a realisation that an actual or real threat indeed exists which was previously relegated in the confines of a fictional world. Breaking all the barriers between...
14 Pages(3500 words)Essay

Security and Risk Management

...? Security and Risk Management of the of the Security and Risk Management Introduction In the given scenario, a securitymanager employed at a large store is concerned at the extent of shoplifting in the store and has undertaken a piece of research which examines the problem. I am being asked to write a critical review of this research which focuses particularly on the methodology of the study. Writing a Good Research Paper: Start with the Basics A professional or scholarly research article as quoted in a peer reviewed journal generally comprises the following parts: 1. Introduction, Purpose and Scope of the Research 2. Literature Review...
11 Pages(2750 words)Essay

Security Risk Management Plan

...ongoing process throughout the project life, and it includes process of planning, identification, analysis and finally monitoring and control. With new risk identified with time these processes are updated. With the Rural Internet Kiosk, quite a number of risks are assessed to happens along the setting up of the whole organization and is mainly divided into four; the general management, personnel policies, insurance and general protection against fraud, terrorism and many other potential threats. The potential risk focused at the main four areas need senior management consideration because they will end up affecting the final project...
6 Pages(1500 words)Essay

Security Risk Management

...making criteria and implementing them to bring about necessary changes in the system that will work over a reasonable period of time. While the task was accompanied with obvious threat from affected parties, I went ahead to bring about necessary changes nevertheless. Now we shall specifically look at the areas that needed attention within the scope of various categories of risk management. Risk Avoidance As we know, these are those critical aspects where risk factor for the organisation has to be avoided at any cost. While this may directly hamper work output in an organisation or even prevent specific gain from accruing due to total...
14 Pages(3500 words)Case Study

Criminology (Risk & Security Management)

...Running Head: Criminology – Risk & Security Management Criminology – Risk & Security Management [Institute’s Criminology – Risk & Security Management Federal Trade Comission’s reports suggest that of all the types of identity theft, credit card fraud is the most common one. AARP analyzed the complaint data from FTC and concluded that complainants who were under 50 years of age were much less likely to be victimized by credit card fraud; however, people aged 50 and over were victimized much more. Hence, it was important to develop technologies and techniques for the protection of older...
9 Pages(2250 words)Essay

Risk & Security Management

...with the risks to lives and health of many persons and large material interests, it would be correct to assume that the severity of losses, risks, threats, and damage is what distinguishes emergency from a disaster. In many aspects, a conventional emergency situation can be viewed as an effective means to warn security & risk managers of the coming dangers and existing risks without incurring significant losses or deaths (Quarantelli 1998; Rodriguez, Quarantelli & Dynes 2007). Emergency is the starting point of security and risk analysis, when otherwise is not possible. Emergency for...
6 Pages(1500 words)Essay

Security & Risk Management

...Security and Risk Management [Word Count] Security and Risk Management Introduction The rapidly changing andcompetitive business environment has put a lot of pressure on the managers to make he right decisions. An organization cannot survive without taking risks and in order to succeed in today’s environment, it is required that the managers take risky decisions as the company would otherwise will not be able to rise up to its competitors. There are many difficulties associated with making risky decisions and any wrong move can result in serious consequences for the whole organization....
9 Pages(2250 words)Essay

Information Security Risk Management

...Information Security Risk Management Introduction Information security is the protection of information for business continuity as it is fundamental for maximizing the business opportunities and return on investment. Information security and risk management has become a critical business discipline with sales, marketing, financial management and Human resource. 2. Literature Risk management and its role in the organization Risk was called as a main cause for uncertainty in the business organizations. Therefore, business companies focus upon the...
2 Pages(500 words)Case Study

Threat and Risk Assessments

...market by looking at market dynamics, prices, actors and products. Through looking at the mentioned indicators, analysts are in a position of estimating the nature of a criminal group and can hence determine complexity and the magnitude of the threat. Criminal individual groups can as well be evaluated through assessment of actor’s capabilities, opportunities, intentions, limitations and vulnerabilities. Threat and risk assessment has done much as far as global security is concerned. Through this, many countries can celebrate the pride of citizen’s safety. It has enabled law enforcement agencies to catch up with several criminal issues and even offer recommendation on...
5 Pages(1250 words)Essay

Threat and Risk Management

...Threat and Risk management and Threat and Risk management Introduction The Control Crisis group has been tasked with the responsibility of providing strategic guidance on security risks to the Foreign Commonwealth Office in Iraq. As a result, the organization has a responsibility of identifying threats facing diplomats in the country. The report was conducted following an increase in anti-western sentiments among the Muslim population following the publication of offensive cartoons in a French newspaper. The tension is evident in probable and real terrorist attack on the office where the...
12 Pages(3000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Risk Management and Security Threat for FREE!

Contact Us