Preview

IS3110 Unit 1 assignment 1

Satisfactory Essays
Open Document
Open Document
382 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3110 Unit 1 assignment 1
Application of Risk Management Techniques
Treats that this company is vulnerable to are but not limited to tornado, malware, equipment failure, stolen data, DoS attacks & social engineer. The like likelihood of each is moderate to high. Headquarter is located right in tornado alley. Since this building house all three serves, a direct hit would result in a total loss. Since the users connect to the LAN with Windows Vista which is very outdate the risk of malware is also high. Along with having all three servers in a central location, there is no mention of any backup locations or even if a DRP is in place. Therefore equipment failure (loss of data) is very high. There is a mention of a direct attached storage but it appears that there is no AUP in place. This means everyone has access to the data. Stolen confidential data of a customer is a serious and costly risk. There is no mention of any firewalls in place. If the servers are not protected by firewalls or intrusion detection systems can result in loss of availability. Users and social engineering is the weakest and easily the most vulnerable. Lack of access controls and security awareness can result in serious loss of confidentiality and hackers are real threat in today’s world. With the sales people accessing the network through a home office and share internet connection with headquarters, this is the bulk of the concern.
For each risk listed the following should be implanted:
• Tornado- the vulnerability here is location. You can either accept the risk by doing nothing because of the location or what I suggest is mitigate the risk by purchasing insurance.
• Malware-outdated software. This vulnerability can be avoided by installing anti-virus and keeping it updated.
• Equipment failure-no backup’s setup. This is another vulnerability that can be avoided by performing regular backups and keeping them at an offsite location.
• Stolen Data-access controls not implanted. Since the company has a direct

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Assignment 1

    • 4614 Words
    • 19 Pages

    QID ch1 ch1 QUESTION A "computer competent" person must know how to upgrade and repair their computer A computer monitor is a video display device ANSWER option2 option1 TRUE TRUE OPTION1 OPTION2 FALSE FALSE is the term used to describe a communications system connecting two or more computers together FALSE FALSE FALSE FALSE FALSE FALSE FALSE hard disk FALSE FALSE the number of children born in Chicago in 1950 mean of your credit the percentage of card balances for the brown-eyed peop past three years in your class optical disk DVD is the conection describes the relationship between among computer users, often seen at a data element and a conferences database record OPTION3 OPTION4…

    • 4614 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    The most important concept in this week's reading was the Copyright laws. How the laws creation in fifteen century England where design to create a monopoly in book printing. Is surprising to read of their constant evolution in the United States since the Act of 1976 to become what they are now. Another thing is to be aware of how copyrights laws can adversely affect your projects if not doing in dept research of your content. In my case copyrights laws existence and their complexity makes it the most important concept of this week's reading.…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Mr. Brown, a second-grade teacher, is concerned about Ed, one of the students in his class. On the basis of his observations, he reports that Ed never completes any of the classroom work that he is assigned, and he reads at a beginning first grade level. He suspects that Ed has a learning disability and refers him for a special education evaluation. The school psychologist, Dr. Long, administers an intelligence test to asses Ed's cognitive abilities. She assigns Ed to a class for students with Learning Disabilities and develops an Individualized Education Program for this setting. She then sends Ed's parents a letter, informing them that Ed has a learning disability, and invites them to a meeting to describe…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT1310 Unit 1 Assignment 1

    • 4837 Words
    • 20 Pages

    In order to get some statistical data about the number of formula 1 crashes and their causes, we randomly picked up 1 race from each year starting from 1960 up till 2013, then extrapolated results to the respective entire year, and then calculated average numbers. Based on those figures we compiled the table below.…

    • 4837 Words
    • 20 Pages
    Good Essays
  • Better Essays

    Nt1310 Unit 1 Assignment 1

    • 7711 Words
    • 31 Pages

    The changing needs of people led to the development of a means to make tasks a lot easier and more convenient. This is technology. It is a tool that now plays an important role in people’s everyday life. Because of this technology every complicated task is now provided with an equal solution. Hence, the difficulties that people experience in doing tasks are minimized. It is not impossible that in the near future, these difficulties will be eliminated. When this happens, industrial evolution will surely take place.…

    • 7711 Words
    • 31 Pages
    Better Essays
  • Good Essays

    A disastrous situation that so many are familiar with is tornados. Tornados are so hazardous because of the high winds, risk of being hit by flying or falling…

    • 741 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The computer system for ABC Healthcare is a unified network containing multiple elements. It consists of multiple computers connected a single Internet access point. The wireless access point allows for external and internal connections but does not distinguish between employees and customers. There is only one server for the entire company and there are no security separations within the network. The network does not have any firewall to prevent access from outside and a single switch moderates all internal connections. The use of personal computers is allowed with unmonitored connections to the system. The printer is connected directly to the network.…

    • 822 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Is3110 Chapter 1

    • 885 Words
    • 4 Pages

    6. Describe three views that firms can take of their IT infrastructure. Page Ref: 221-222…

    • 885 Words
    • 4 Pages
    Satisfactory Essays
  • Best Essays

    Bt1110 Unit 1 Assignment

    • 1396 Words
    • 6 Pages

    From the case study we can see that in 2014, both the company’s revenue and net profit had an increase of 7% and 3% respectively when compared to 2013. The increase was due to the ongoing marine projects overseas and infrastructure business, this would suggest that the company’s property business may not be as strong. The case study also explains that 2015 will be a tough year for Polar, due to a severe drop in oil prices as Polar has its Marine business. Furthermore the Eurozone market recovery remains weak and China is expecting to grow at a slower rate, as China exports most of its products and services to the rest of the world, many countries including Singapore will be affected if Power house countries such as China slows…

    • 1396 Words
    • 6 Pages
    Best Essays
  • Better Essays

    The problem comes in finding and fixing these problems. Depending on how big or small the weakness is determines how detrimental the risk is. After reviewing the infrastructure of Aircraft Solutions, I was able to determine that there were a few things that would put their system in a vulnerable state and potentially put their system at risk. The two areas where they are most vulnerable are the hardware and the policy. The first vulnerable area is the hardware of the firewalls that are not being used appropriately to protect the network against breaches in the networks architecture and hierarchy. Without the firewall in place it exposes the network (LAN) to any malicious internal as well as external attacks. These attacks can lead to the compromising of any of the company’s data.…

    • 870 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Disaster Recovery Planning

    • 2339 Words
    • 10 Pages

    We are going to share a few different ways to help insure that data is safe in case of a disaster. Unforeseeable problems such as fire, floods, viruses, theft, or corruption are just a few of the disasters that can a strike a business. And because data equals money, they need to have their data protected, somehow, someway either backed up and/or replicated off site. According to Rick Lacroix of EMC in Hopkinton, Mass. "Information protection has taken on new importance over the past several years and customers and companies of all…

    • 2339 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3350 Unit 4 Assignment

    • 386 Words
    • 2 Pages

    This assignment is a compulsory assessment task. Value: Due: 15% of final mark 12.00pm (midday) on the scheduled teaching day of Week 5 Topic: Marking criteria: Assessment 1 See guides to Assessments…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    IOP3073 Assignment 1 2014 V2

    • 3449 Words
    • 13 Pages

    4.1 Types of possible opportunities available to an individual within the four core domains of partagogy.…

    • 3449 Words
    • 13 Pages
    Best Essays
  • Satisfactory Essays

    Risk of Life

    • 287 Words
    • 2 Pages

    2: Possible network-wide failure because of a computer virus or malfuntion (like Y2K, except real).…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    b.i. Examples of internal risks that may affect business are unauthorized access by individuals who are employed by the company, and those who aren’t employed by the company but still have access to individual store’s computer systems, applications, or areas where the servers and backup media are located. Other external and environmental risks include fire, floods, power outages, hardware failure, software glitches and failure, storms, and other acts of nature.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays