CMGT442: Information Systems Risk Management
February 14, 2011
TABLE OF CONTENTS
INTRODUCTION..................................................................................................................... 3
SECURITY REQUIREMENTS............................................................................................... 3 Firewall Protection................................................................................................................ 4 Password Protection.............................................................................................................. 4 Password Renewal................................................................................................................. 4
POTENTIAL RISKS................................................................................................................. 5 Database Hacking.................................................................................................................. 5 Database Corruption............................................................................................................. 6 Espionage............................................................................................................................... 6
CONCLUSION.......................................................................................................................... 6
APPENDIXES........................................................................................................................... 8 Appendix A: Firewall Concept and Responsibility (Figure 1).............................................. 8 Appendix B: SWOT Analysis Example (Figure 2)................................................................. 9
References: Apollo Group (2003). Huffman Trucking Homepage. Retrieved February 08, 2011, from https:// ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Huffman/HuffmanHome002.htm. Bill Gates (n.d.). BrainyQuotes.com. Retrieved February 14, 2011, from BrainyQuotes.com Web site: http://www.brainyquotes.com/quotes/quotes/b/billgates191262.html. Business Dictionary (2011). Risk. Retrieved February 11, 2011, from http://www. Daly, P. G. (2006). Preventing Internal Security Breaches. Retrieved February 11, 2011, from http://www.intranetjournal.com/articles/200607/pij_07_13_06a.html. Greenfile Developments, Ltd. (1997). The SWOT Analysis. Retrieved February 09, 2011, from http://www.greenfile.net/resources/Periscope/swot.htm. HowStuffWorks (2011). How Computer Viruses Work. Retrieved February 14, 2011, from http://www.howstuffworks.com/virus.htm. Solution One Network (2003). Network Protection/Recovery and Security. Retrieved February 11, 2011, from http://www.solution-one.net/protec.htm. TopBits (n.d.). How Firewall Protection Works. Retrieved February 13, 2011, from http://www.tech-faq.com/working-of-firewall-protections.html. University of Phoenix (2005). Huffman Trucking Service Request SR-ht-001. Materials section. Retrieved February 08, 2011, from https://ecampus.phoenix.edu/secure/aapd/cist/ libraries/Service%20Requests/HuffmanSR/huffmanSR001.htm. WiseGeek (2011). What is Computer Hacking? Retrieved February 12, 2011, from http://www.wisegeek.com/what-is-computer-hacking.htm.