Preview

The Impact of Weak System Security- Unit 7, M1

Satisfactory Essays
Open Document
Open Document
744 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Impact of Weak System Security- Unit 7, M1
The Impact of Weak System Security

Task: Explain the following statement: “The impact of weak system security is severe”
Weak system security can cause massive problems for an organisation. Holes in security can allow hackers to gain access to an organisations data or its customers’ personal information etc. Once this happens, drastic problems can be caused for the organisation; anything from severe loss of earnings, loss of customers or even bankruptcy if the problem is not taken under control quickly. I will talk about some of the products of having weak system security, and the problems that these can cause.

Loss of Earnings- Weak system security can result in loss of earnings due to the fact that possibly hundreds if not thousands of pounds will have to be spent for the company to hire someone to come and see where the weakness in the system is, and then to actually repair this weakness and ensure that there are no others now or in the future. In addition to this, it is not just the organisation itself that can feel the brunt of the impact of weak security. Employees whose responsibility it is to ensure that there are no weaknesses can also be hit hard. Generally, it is up to managers to ensure that there are no weaknesses in a systems security; or at least to reduce the risk of negative impact/damage on the company. This means that if there is a major weakness is found in the system of an organisation, managers could lose their jobs as a result of negligence etc. This then puts the managers in a situation where they are losing money, not just the company.
Loss of Customers- Weak system security can also result in the loss of customers as people will not want to use a business that has problems with their security as their personal details or information may be at risk. For example, if a bank has a weakness in its security, and this weakness is exploited by hackers; then customers’ information may be stolen and used to purchase goods under their name. This

You May Also Find These Documents Helpful

  • Good Essays

    These risks have to be borne by the business as a part of its normal business risks. Further it is the responsibility of the company to maintain the highest level of security for its accounting information system. The physical security should be fool proof, authentication system should be the most advanced, virus protection should be the latest, and backup should be done at a safe place outside the premises. Such measures are required to ensure that attacks on the accounting information system like identity theft and loss of irreplaceable data do not take…

    • 838 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Security breaches affect businesses all over the corporate America. Every day there are thousands of companies that are in threat and danger of being affected by this issue. Each business can be affected deeply by this problem. Security breaches can tarnish and blemish the image of the company and create significant tangible and intangible losses for a business.…

    • 435 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Inherent Risk

    • 417 Words
    • 2 Pages

    Nature of data processing – the more poorly the IT system is made and managed the greated the inherent risk…

    • 417 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Royal Bank of Canada experienced some fundamental managerial errors in May 2003. It was reported as a major “glitch” that had been caused by wrong configuration during the installation process. A simple problem had severely affected the lives of millions of people. In this essay I will discuss the security and control problems such as the simultaneous upgrade of both the main and back-up systems. This will lead into the strategies management could have used to prevent these problems happening in the first place and what they can do differently in future. I will also explain how management neglected the public relations side of the issue which had customers questioning the reliability and stability of Royal Bank of Canada ultimately leading to disloyal customers. Finally this essay will argue how well Royal Bank of Canada responded to the computer software issue and what they should have done differently to prevent the problem and ease the situation once it had happened. From the errors and mistakes made from the Royal Bank of Canada, other banks and industries can learn how to avoid them. One such bank in Australia is St George, in depth I will discuss the risks of malfunction or abuse customers may experience when dealing with the information systems with reference to relevant case studies.…

    • 2352 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Critical Systems Failure: It is a technological threat. The central point for this threat is single-point system vulnerabilities trigger cascading failure of critical information infrastructure and networks. Respondents consider the risk ‘that a single vulnerability could trigger cascading failure of critical…

    • 595 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Computer Security Issues

    • 1058 Words
    • 31 Pages

    According to American FBI (US Federal Bureau of Investigation) investigation, the network security creates the economic loss surpasses 17,000,000,000 dollars every year. 75% corporation report finance loss is because the computer system security problem creates. More than 50% safe…

    • 1058 Words
    • 31 Pages
    Better Essays
  • Better Essays

    itt security final paper

    • 1085 Words
    • 5 Pages

    Richman Investing is one of the top leading investing firms in the United States. In order to stay on top of the competition a few things have to be implemented. Accessing Richman’s intranet and extranet is one of many nice features about the company. Securing these ways to access the network is more than just saying which sites users can and cannot access. It is encrypting data, setting passwords, physically locking doors, and many other very important security measures that need to be thought of. Being 100 percent safe and secure is not achievable but if we follow these steps Richman Investing will be more secure and will remain number one in the United States when it comes to investing.…

    • 1085 Words
    • 5 Pages
    Better Essays
  • Good Essays

    system security

    • 573 Words
    • 2 Pages

    • Masquerader: An individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account…

    • 573 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Case Study 4

    • 1722 Words
    • 6 Pages

    The Flayton Electronics security breach had brought with it many risks and opportunity since the time that it was breached. There have been many issues and speculations on what and how the incident has brought about. In conclusion to part four of this assignment, a few recommendation have been made in order to address the data breached, one of the first recommendation was to perform a series of investigation and analysis about the risks, creating a plan to cover the risks from the incident to become much larger threads. As following the line of thinking from the other three prior assignments, there are several risks that have been identified in regards to the Flayton Electronics security breach incident. The top risks identified were communication incident, lack of infrastructure to keep up with company’s fast growth, need to educate employees in the event of another similar problem happen again, the restructure the IT security so customer information are more protected, and the political risks as the electronics company is risking law suits against the company if the customers are to find out about the stole data. Furthermore, the company is working closely with the FBI and secret service who have advised them to not communicate the breach to any of their customers (McNulty, 2007).…

    • 1722 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Business nowadays has big problems in security. There are many cases presenting that crimes and fraud are attacking if the business were already closed and the business establishment have not enough security to prevent a particular crime. Security is one of the important things to consider in a business. It is important across all walks of life to ensure the overall safety and possessions of all individual are comprehensively protected.…

    • 4191 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Acc1006 Mis Tutorial 1

    • 470 Words
    • 2 Pages

    There are factors other than employees’ integrity that that contribute to obtaining an adequate system security, such as reduce employees’ situational pressure and reduce employees’ opportunities to access the information.…

    • 470 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    intrusion detection system

    • 2058 Words
    • 9 Pages

    8/5/2010 Paul Apolinar Christian Chavez RJ Favila Arni Paragas Jessica Mayuga Abegail Soñas  Defined by ICSA as:  The detection of intrusions or intrusions attempts either manually or via software expert systems that operate on logs or other information available from the system or the network. IT Security     …

    • 2058 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Zain

    • 629 Words
    • 3 Pages

    There are some weaknesses. For example, because of the poor corporate governance procedures, the risk management systems have failed. Secondly, boards had agreed a strategy but they didn 't keep under observation if this strategy implements or does not.…

    • 629 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Data Pro Act

    • 278 Words
    • 1 Page

    The effect this has on society is that businesses can be fined a large sum of money if this Act is broken, this means that the business has to ensure that customers data is stored in a safe manor. Once a business has had an ‘incident’ involving data protection then customers of a business can become less confident in using their services in worry.…

    • 278 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Sew What Inc. Case Study

    • 1348 Words
    • 6 Pages

    A company will not know what problems to fix or how to make the customers' experiences better if they are not aware of it. She also needs some malware security since her company relies mostly on internet-based technologies. She needs to be prepared incase her system crashes or has glitches, because information can become lost or deleted. A business can become vulnerable to individuals stealing or phishing for customer information.…

    • 1348 Words
    • 6 Pages
    Good Essays