Preview

Jmz Memorandum

Good Essays
Open Document
Open Document
823 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Jmz Memorandum
Memorandum
To: Senior Management, JMZ Adventure Ecotours
From: IT Department, JMZ Adventure Ecotours
Date: 4/20/2013
Re: Information Security Risk Assessment Findings
The IT department was recently given the task of performing an information security risk assessment in order to help guide management in prioritizing their approach to mitigating security risks for JMZ Adventure Ecotours. This memo will show the results of that analysis; identifying the greatest IT vulnerabilities and risks within the company, provide recommendations for mitigating the information security risks and provide recommendations regarding the overall information security program at JMZ.
Information Security Impacts
Impacts are the [adverse] consequences on the individual, organization or community resulting from information security incidents:
• Disruption to organizational routines and processes with consequent interruption to trading capabilities, loss of income, etc.
• Direct financial losses through information theft and fraud, whether simply the “background noise” or exceptional and obvious in nature
• Decrease in shareholder value because of negative impact on customer relations, lost sales, and decline in public confidence
• Reputational damage causing lost customers, customer complaints and defection
• Replacement costs for equipment and data damage, stolen, corrupted or lost in incidents
• Reduced profitability, growth and bonuses caused by the background noise of security incidents, control costs and unspecified doubts about the effectiveness of security

Information Security Vulnerabilities
A flaw or weakness in a system’s security procedures, design, implementation or internal controls that could be exploited and result in a security breach, violation of the systems security policy or other impact.
• Software bugs and design flaws, particularly those in mass-market software such as Windows and TCP/IP [usually exploited by hackers and other criminals]

You May Also Find These Documents Helpful

  • Better Essays

    This IT security report will go over the top security IT threats, security considerations, security policies, and awareness training. The security report will help the design team protect the new system from the threats that have been identified during the design phase of the new system. At the end of this report there will be provisions suggested that will help Kudler Fine Foods internal staff to help validate security measures once the new program is up and running so they can keep the system safe from hackers, attacks or any…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sof Optics

    • 1570 Words
    • 19 Pages

    ii. Loss of customers (and sales) due to long customer service wait times or lack of…

    • 1570 Words
    • 19 Pages
    Good Essays
  • Powerful Essays

    SE578 - Practices for Administration of Physical & Operations SecurityKeller Graduate School of ManagementPREPARED BY: PREPARED ON: APRIL 9, 2011…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    of threats that can have adverse impacts on operations, assets, and individuals. Keeping up with…

    • 3838 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Security + 280 Exams

    • 2838 Words
    • 12 Pages

    | (TCO 1) What is the most common threat to information security in an organization?…

    • 2838 Words
    • 12 Pages
    Satisfactory Essays
  • Good Essays

    | Describe the security issues that may threaten system performanceThe possible threats to system performance may be: unwanted e-mail (‘spam’), malicious programs (including viruses, trojans) and hackers. Security precautions can be taken beforehand such as use of access controls. We can configure anti-virus software, adjust firewall settings, adjust internet security settings; backup; store personal data and software safely; treat messages, files, software and attachments from unknown sources with caution; download security software updates.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    If there is an Impact on the stakeholders – Employees will not have a safe, secure job and may have to take a pay cut or reduce hours they work, this may lead employees to look into finding a different job where they know the business is successful. They may not get the level of training they have been used to.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    Lenscrafters Swot

    • 474 Words
    • 2 Pages

    2. This affects the business by losing potential clients and new marketing strategies to achieve a successful name such as the company.…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Why Is Whs Important

    • 323 Words
    • 2 Pages

    Non-insurable costs such as lost time injury and reduced productivity, staff replacement, retraining costs as well as loss of business reputation…

    • 323 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 4

    • 340 Words
    • 2 Pages

    One the first steps in implementing an effective security plan is to periodically assess Organizational risks. Identifying and mitigating risk will help in establishing a security management structure and assigning security responsibilities. Without having an understanding of your risk you are unable to determine the proper security policies, procedures, guidelines, and standards to put in place to ensure adequate security controls are implemented. The risk assessment provides a baseline for implementing security plans to protect assets against threats. Within the risk assessment some basic questions must be answered, What assets within the organization need protection, What are the risks to each of these assets, How much time, effort, and money is the organization willing to spend to upgrade or obtain new adequate protection against these threats?…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The impact of failures to introduce effective change can also be high: loss of market position, removal of senior management, loss of stakeholder credibility, loss of key employees.…

    • 1124 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Industrial Espionage

    • 460 Words
    • 2 Pages

    Due to the loss of companies confidential information, this results in loss of revenue, loss of competitive advantage. As a result, in some cases companies have gone out of business entirely and every individual in the company lost their job. (TRADE, 2000)…

    • 460 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    -Increase in the cost, disruption of supply or shortage of ingredients, other raw materials or packaging materials could harm our business.…

    • 611 Words
    • 3 Pages
    Satisfactory Essays