Preview

Kenneth Sims IS3230 Unit 2 Global Acces

Satisfactory Essays
Open Document
Open Document
406 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Kenneth Sims IS3230 Unit 2 Global Acces
Kenneth Sims (13740642)
IS3220 Unit 2
Global Access Control Case Study

Global Limited has a reputation of being one of the world’s leading providers of infrastructure information systems, software, and services around the world. They are in need of a better business and security practices. They have identified a problem which has been likened to a game of Whack-a-mole. To help with its security problem, Global as called upon the knowledge of CIS-its own Security Division. One of the first steps is to understand what information is critical to the business initiatives. Global Cadence is front-end for over 40 applications and has for 200,000 registered users. Global is working to minimize its impact.
What is the significance of compliance and financial reporting from an insecure system. Its purpose is to give investors more confidence in the financial reporting. Ignorance of a vulnerable system is no longer a defense because top, SOX has driven significant spending on IT and IT security. An insecure systems is the life line of a Company. Without it no assets are safe.
Influence of risk management process which have made Global fulfills in goals. Understanding Globals goal was part of the problem, once they understood then it was simply following a risk management plan which pertains to these items. Most critically, risk management plans include a risk strategy. Broadly, there are four potential strategies, with numerous variations. Projects may choose to:
Avoid risk — Change plans to circumvent the problem;
Control/Mitigate risk; — Reduces impact or likelihood (or both) through intermediate steps;
Accept risk — Take the chance of negative impact (or auto-insurance), eventually budget the cost (e.g. via a contingency budget line);
Transfer risk — Outsource risk (or a portion of the risk - Share risk) to third party/ies that can manage the outcome. This is done e.g. financially through insurance contracts or hedging transactions, or operationally through

You May Also Find These Documents Helpful

  • Powerful Essays

    MU1 Assignment 2

    • 1726 Words
    • 6 Pages

    The impact of the risks on global business it is dramatic in our days, changing the entire look of the industries and financial services. Some risks could be anticipated and identified but some could not. Companies now are using more and more key steps and principles to better manage the risks by;…

    • 1726 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Acc 544 Internal Control

    • 800 Words
    • 4 Pages

    Insurance approach The insurance approach is generally used to ensure the acquirement to transfer certain types of risks that could affect the business property, the business assets, and affect the employees (McCarthy, 2004). The insurance approach used as a tool to prevent business losses; in addition, it is more like a financial risk tool than management risk tool. This approach will diminishes the impact of the losses, protecting the business assets from potential losses, therefore, making the insurance approach more reactive, than proactive (McCarthy, 2004).…

    • 800 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    5 Important Vulnerability, Impact & Solutions ……………………………………………………………….. 8 References …………………………………………………………………………………………………………………… 12 Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (“Critical Security Controls,” n.d.).…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    * Risk is in the eye of the beholder * Risk reflects how uncertain outcomes cause loss or injury to a particular individual or group…

    • 1485 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Developing a risk management plan leans heavily on a bold commitment by all stakeholders. The stakeholders need also to understand the roles and responsibilities related to the determined risks. As with any project these risks will vary depending on the type of projects along with what the project is dealing with. The project manager must understand that all projects should be approached with a clear thought process and not bring previously used mind sets to a new project. Clear and fresh minds will help to discover new risks and bring immediate attention to unusual or unfamiliar elements and concerns.…

    • 1195 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Unit 2 – Global Access Control Case Study With business always changing and data always needing to be protected, it has become an issue to determine the level of security for confidentiality and integrity purposes while allowing it all to be properly available for use. To put Global in front of the competition with its customers it implements its Global Connect-Link for collaboration. Through the use of its security division, CIS, Global prioritizes its data according to the risk of activity of usage against the potential business reward. It conducts constant supervision and monitoring to maintain confidentiality, integrity and availability. Global also has its own Continuity Manager software to manage large amounts of external users while maintaining the necessary centralized security from unauthorized access. Another level of security Global offers is its DLP or data loss prevention product. This keeps all data whether structured or unstructured when in motion or at rest from being compromised and deleted. Lastly in regards to Global’s controls and the documentation of the effectiveness of these controls, CompScan, an audit program is in place to collect and analyze all the data.…

    • 560 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Works Cited Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    March 12, 2012 Abstract In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    Quiz 2

    • 861 Words
    • 4 Pages

    | C. avoid risk | | | D. greatly minimize risk | | Correct Marks for this submission: 1/1.…

    • 861 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Bus 505 Assignment2

    • 723 Words
    • 3 Pages

    Risk management is the process of identifying risk issues and the options for controlling them, commissioning a risk assessment, reviewing the results and selecting amongst the assessed options to best meet the goals. The purpose of risk analysis is to help managers better understand the risks (and opportunities) they face and to evaluate the options available for their control. (Vose software, 2007)…

    • 723 Words
    • 3 Pages
    Good Essays
  • Good Essays

    If a company or organization’s data and systems are not secure, be it from lack of proper controls or improper physical security, then they would be out of compliance with industry standards. According to the SOX act a company is supposed to have internal controls in place to prevent and detect unauthorized access of financial data.…

    • 515 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The key deliverables of the risk management planning process is that the degree and type of the risk can be identified which will help ensure that there are enough resources and time is allotted to the planning of each risk. The final outcome of the planning process is the basis on how the risk should be evaluated (Project Management Institute, 2008).…

    • 355 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There are five basic steps to identifying and managing risks. 1. Identify the problem 2. Decide who might be harmed and how…

    • 958 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    In a global economy, businesses thrive with good Information technology infrastructures. Information technology plays vital roles in successful businesses. Although tools like online advertising, and e-commerce can help businesses thrive in today’s global economy. However, this paper will focus on the importance of Information security functions within Ecolab’s IT organization. Furthermore, the impacts of information security functions from a business perspective will be discussed.…

    • 1661 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Week 5 You Decide Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays