StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Risk Management - Essay Example

Cite this document
Summary
Risk management Name University Risk Management Like many other organizations in several parts of the world, our organization continues to face a significant number of security related threats. For example our network security technologies are still susceptible to disruption by unauthorized persons…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Risk Management
Read Text Preview

Extract of sample "Risk Management"

Download file to see previous pages

Although CSA has been largely effective as security technology, it has a number of vulnerabilities that allow malicious attackers to carry out remove code executions on the network (Allen,2001). On the other hand, our organization employs the use of both behavior based antivirus and signature based antivirus. Antivirus has proven to be significantly effective particularly in the detection and deletion of suspicious programs in our systems. A major challenge with this technology is that antiviruses also have a number of security flaws and sometimes hackers have been able to evade detection by using malware.

Finally our organization has also employed the use of file/HDD encryption technologies to make both the data and files we transfer over the network to be unreadable to unauthorized individuals. In terms of effectiveness, encryption is fully effective and does not only improve the security of the organizations data but is also easier to be applied by the users. There are a number of additional security controls that can be added to the security technologies in our organization to help prevent unauthorized persons from accessing our confidential information and sensitive systems.

These controls include administrative, technical and managerial controls. With regard to the administrative controls, our organization still needs a number of controls such as well written policies, guidelines and procedures that can be used as a framework of reducing the various security risks facing our organizations network systems. For example some of the additional policies that our organization urgently need at the moment included a well developed corporate security policy as well as a password policy.

On the other hand, the additional technical security controls required in our organization include IDS and firewalls. Additionally we also need to put in place other important technical security controls such as logical access controls as well as new version antivirus software. Finally our organization will require managerial security controls such as security guards to protect the physical installations within our organization, cameras as well as locks and doors. To effectively mitigate some of the security risks in our organization, there is need to include all these security controls and use them together with the security technologies that are currently in place.

As earlier been noted, there are a number of security technologies and methodologies used in our organization. Some of the security technologies and methodologies we use in our company include Cisco security agent (CSA), Antivirus, and file Encryption. The use of CSA has significantly helped our organization to be able to minimize cases of end point intrusion by allowing our security experts to monitor the network traffic and system activity in our networks systems of our organization. Given the constant security threats that our organization has continued to face, Cisco Security argent has effectively enabled our organization to overcome some of the vulnerabilities in its security systems.

As a security technology, CSA has also provided an efficient infrastructure that supports various network operations in the organization. Finally although it has a few flaws, this security technology can effectively be integrated by the other technologies to

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Risk Management Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/management/1397077-risk-management
(Risk Management Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/management/1397077-risk-management.
“Risk Management Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/management/1397077-risk-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Risk Management

Financial Risk Management

FINANCIAL Risk Management Table of Contents Risk Management and Bear Stearns 3 Introduction 3 Risk Management: An Overview 3 Risk Management policies followed by Bear Stearns 4 6 Risk Management and Bear Stearns Introduction The Bear Stearns Companies, LLC, founded in 1923, was a New York based company which was involved in investment banking, trading of securities and derivatives and brokerage activities globally all over the world....
4 Pages (1000 words) Essay

Benefits of Risk Management, Risk Management Frameworks

The paper "Benefits of Risk Management, Risk Management Frameworks " discusses that Risk Management has taken an important place in contemporary business organizations.... nbsp;… Risk Management is a comprehensive subject within which different frameworks.... Each framework is aimed at providing a complete guideline for Risk Management in different disciplines.... nbsp; Importance of Risk Management Risk Management is extremely crucial because it helps the decision-making process regarding viability and competitiveness between organizations....
14 Pages (3500 words) Assignment

Project Risk Management

This paper "Project Risk Management" discusses the London Heathrow Terminal 5 that has emerged to be the largest airport in the airline industry.... This paper attempts to study and evaluate the Risk Management strategy and theories involved in the construction of London Heathrow Airport's Terminal 5, and critic these theories.... Risk Management activity is mainly concerned with a proper analysis of the different operations, identification of the prospective threats to the system, occurrence of the ill effects and finally taking suitable actions to mitigate and manage the risks( David and Roland,  2006)....
10 Pages (2500 words) Case Study

Risk management process

Because individuals, organizations, agencies, institutions and… This is because Risk Management applies available resources to monitors and control risk with a view of trying to minimize is as much as possible.... There are many sources of risk such as This paper gives a critical analysis of a diagrammatic representation of the steps of Risk Management.... This is achieved in conjunction with a detailed evaluation of the journal article “Understanding Risk Management in Small 7 Steps” (Mazareanu, 2011)....
4 Pages (1000 words) Essay

Information Security Risk Management

Information security and Risk Management has become a critical business discipline with sales, marketing,… Risk was called as a main cause for uncertainty in the business organizations.... Organizations having control over Information Security Risk Management Introduction Information security is the protection of information for business continuity as it is fundamental for maximizing the business opportunities and return on investment.... Information security and Risk Management has become a critical business discipline with sales, marketing, financial management and Human resource....
2 Pages (500 words) Case Study

Risk Management In Business

This research paper demonstrates Risk Management in business and its special features.... It describes the benefits of Risk Management, limitations, cost of accidents at work and insurance.... hellip; Thus it is imperative for the companies irrespective of the industry to which they belong, to develop and implement active Risk Management policies and strategies in order to enable them to cope with such unforeseen risks.... The importance of Risk Management has risen in recent times owing to the events such as the rise in terrorist activities, the threats posed by them especially in the wake of the 9/11 attacks on the World Trade Centre, which has put companies in high risks of attracting unimaginable financial as well as personal losses....
10 Pages (2500 words) Research Paper

Risk Management Decisions

The author highlights that Risk Management is fairly regarded as one of the fundamental elements of successful human performance.... In business or non-profit organizations, in emergency situations or critical procedures, Risk Management works to help individuals.... A Risk Management cycle incorporates a series of actions and decisions.... Generally, a common Risk Management cycle comprises several essential stages/ decisions: risk identification, risk measurement, risk analysis....
8 Pages (2000 words) Case Study

Information System Risk Management

This report "Information System Risk Management" presents an information system that is not an exception to this rule and requires preemptive measures in order to ensure smooth working and avoid any damages.... The field can be termed as emergency management discipline or Risk Management discipline, and it can be defined as a field that looks into those sectors of an entity that are vulnerable to external factors and can have a negative impact on the organization, life of project, or individuals....
6 Pages (1500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us