StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Risk Management and Security Threat - Essay Example

Cite this document
Summary
In the report, it is underlined that program risk can be defined as a measure of uncertainties that any aspect of a program will perform its required functions under the required schedule and performance constraints…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Risk Management and Security Threat
Read Text Preview

Extract of sample "Risk Management and Security Threat"

Risk Management and Security Threat Analysis Program risk can be defined as a measure of uncertainties that any aspect of a program will perform its required functions under the required schedule and performance constraints. These program aspects include design process, performance indicators and operational needs.Institutional needs can be defined as the probability that an organization will not be able to meet its organizational objectives thorough the available resources and constraints.

Such risks may include systems failure, inability to meet program costs and system security breaches [Rob02].The Department of Veterans Affairs has incorporated security measures into its risk management framework. In order to cater for program risk, the department has employed security experts who are competent enough to manage programs and risks associated with them. The department has also improved their detection systems as well as employing security measures such as use of strong passwords.

One of the measures to cover institutional risk in the risk management framework is diversification of products and benefits to veterans[SOP14].There exists some differences between the three reports. One difference is their content. One report is about the threats that come about with new technology platforms while the other is about the evolution of malwares to becoming smarter, shadier and stealthier. This happens when the malware authors develop more effective malware that can easily camouflage and go undetected by program users and owners.

The second difference is that one report, the later report of 2014, is about the advancements made by malware developers and how malware has developed dangerously. The 2013 report is about how development and advancements in technology have opened up new opportunities for malware developers. This difference sensitizes web users that virtually all the internet segments are under risk. The third difference is that the 2013 report mentions android as one of the prime targets of malware and paints a picture that android is highly vulnerable while the 2014 report mentions the advancements made in malware that is targeted at android operating systems.

This is significant in sensitizing users on the potential threats to android that exist. [SOP13].The key threats should be addressed by developing more and better solutions to software security. This is because efforts against security threats can only be successful if the efforts are well ahead of the threats. Government should initiate programs that will encourage growth and development of antimalware. Professionals need to get smarter by the day. This is because if for every new platform there will be accompanying security measures, then the risks brought by security threats will be greatly reduced.

The Department of Veterans Affairs employs experts, uses rapid detection systems and has discontinued the use of Java platform in their systems thus reducing chances of attack by malware [Dep14].ReferencesRob02: , (Jazwinski, 2002), SOP14: , (SOPHOS, 2014), SOP13: , (SOPHOS, 2013), Dep14: , (Department of Veterans Affairs, 2014),

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Risk Management and Security Threat Essay Example | Topics and Well Written Essays - 500 words - 39”, n.d.)
Risk Management and Security Threat Essay Example | Topics and Well Written Essays - 500 words - 39. Retrieved from https://studentshare.org/information-technology/1698877-writers-choice
(Risk Management and Security Threat Essay Example | Topics and Well Written Essays - 500 Words - 39)
Risk Management and Security Threat Essay Example | Topics and Well Written Essays - 500 Words - 39. https://studentshare.org/information-technology/1698877-writers-choice.
“Risk Management and Security Threat Essay Example | Topics and Well Written Essays - 500 Words - 39”, n.d. https://studentshare.org/information-technology/1698877-writers-choice.
  • Cited: 0 times

CHECK THESE SAMPLES OF Risk Management and Security Threat

Security Planning and Risk Assessment

Therefore, the essay would justify the importance of risk management within organizations.... In addition, they may be a significant source of intelligence concerning an impending, or ongoing, threat.... The nature of the threat may demand a level of security that is not economically practical for a private business.... The writer of the essay "security Planning and Risk Assessment" seeks to address the issue of misuse of organizational resource for the sake of secure management....
5 Pages (1250 words) Essay

Security findemental (contract security guard service selection exercise)

Any potentially dangerous situation should be reported to the human resource department or security supervisor at once.... The most vulnerable employees to the risk factors are those working in the public setting, including those working late at night or in the early morning hours, in small groups, in uncontrolled access environments open to other employees and the public, and other areas of previous concern that include the community and workplace settings (Hess 262)....
4 Pages (1000 words) Essay

Risk and Security

Besides these, the usage of portable Risk and security AFFILIATION: Risk and security The current era is that of fast information flow.... An introduction to information system risk management.... The insider threat to information systems.... Potential security ThreatsSome of the potential security threats for this company are as follows:Any employee can code significant parts of the management information system or place a password on these and use it to dictate his or her terms....
1 Pages (250 words) Essay

Threat and Risk Management

The Western coalition of forces had started to withdraw from Iraq only for them to be pulled back in by the increasing threat of ISIS.... The Control Crisis group has been tasked with the responsibility of providing strategic guidance on security risks to the Foreign Commonwealth Office in Iraq.... Another reason that has altered the risk landscape involves the drone strikes by the United States against terrorist leaders in Iraq.... In addition, the reversal of a military strategy in the country has changed the risk landscape....
12 Pages (3000 words) Essay

The Rise in Cybercrime and the Possible Remedy

With the current embrace of technology in the business sector, the internet has become a new platform for theft especially with most internet users being ignorant of their privacy and security in their online presence.... In addition, the organizations lose their customers who feel that they do not get enough security of their money in these organizations.... As more businesses get online and the online population increases, the risk for cybercrime becomes higher....
6 Pages (1500 words) Research Paper

The IT Infrastructure of the Pharmacy Business

he physical threat has become quite common in the present day business activities.... On the other hand, a logical threat refers to the aspect of impacting the software of the IT infrastructure and not on the hardware components in any manner.... The paper 'The IT Infrastructure of the Pharmacy Business' focuses on Information security which is a particular approach of protecting confidential data within a computer security system....
8 Pages (2000 words) Case Study

Risk Management as an Essential Part of Project Planning

The paper "risk management as an Essential Part of Project Planning" argues in a well-organized manner that risk management is a very important function in today's corporate world that is heavily reliant on information systems.... The main reason why the risk management function does not seem to work is that there are very many variables to be considered, most of which are beyond the capacity of the risk managers.... In order to determine why risk management often ends up in failure, it is important for attention to be put on both qualitative and quantitative risk assessment methods....
10 Pages (2500 words) Essay

Management and Information Security - Project Management Body of Knowledge

The object of analysis for the purpose of this paper "management and Information Security - Project Management Body of Knowledge" is the Project Management Body of Knowledge as a collection of processes and various knowledge areas which are involved in the project management discipline.... hellip; The Project management Body of Knowledge is an internationally recognized standard that provides fundamentals of project management in areas that include construction, engineering, automobile, etc....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us