Preview

Computer Risks and Exposures

Better Essays
Open Document
Open Document
1433 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Risks and Exposures
Computer Risks and Exposures
Computers of all kinds within an organisation are constantly faced with a variety of risks and exposures. It is helpful if we first define these terms:
• Computer risk
Probability that an undesirable event could turn into a loss
• Computer exposure
Results from a threat from an undesirable event that has the potential to become a risk
• Vulnerability
A flaw or weakness in the system that can turn into a threat or a risk
The total impact of computer risks range from minor to devastating and could include any or all of:
• Loss of sales or revenues
• Loss of profits
• Loss of personnel
• Failure to meet government requirements or laws
• Inability to serve customers
• Inability to sustain growth
• Inability to operate effectively and efficiently
• Inability to compete successfully for new customers
• Inability to stay ahead of the competition
• Inability to stay independent without being acquired or merged
• Inability to maintain present customer/client base
• Inability to control costs
• Inability to cope with advancements in technology
• Inability to control employees involved in illegal activities
• Damage to business reputation
• Complete business failure
Computer risks. exposures and losses may be characterised as intentional or unintentional and may involve actual damage, alteration of data or programs as well as unauthorised dissemination of information. Objects which can be affected include physical items such as the hardware or hard-copy outputs which are both vulnerable to risks such as theft or loss; the tele-communications system which can cause major corporate grief if unavailable for any reason as well as being vulnerable to internal or external penetration; the applications software which, being a major control element, is vulnerable to change, bypassing or direct sabotage; systems software such as the operating system itself which can also be amended or circumvented; computer operations where control

You May Also Find These Documents Helpful

  • Better Essays

    There are many types of risks that a company has to confront each day in information technology (IT). The four main types of risk are business, audit, security, and continuity risks. A business risk is when a company will not be able to achieve its goals and objectives; this could be union issues, a competing company, fraud, or production equipment failure. Audit risks include misstatement of financials by an auditor or a failure by an auditor to uncover fraud or material errors. A security risk can be a host of things that would ruin the integrity and access of the data, which can also lead to fraud or misuse of other information from internal (like employees) to external (like hackers) sources. And, finally, continuity risks are information system risks that have to do with backup, recovery and day to day availability of the system. When unplanned risks occur, management and auditor need to act quickly to intercept the risk, balance the risk with cost-effective countermeasures, since it is impossible to plan all risks (Hunton, Bryant, & Bagranoff, 2004).…

    • 1178 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    2. What is the relationship between risks, threats, and vulnerabilities as it pertains to information systems…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Kohl's and Dillard's

    • 298 Words
    • 2 Pages

    Dillard's Inc. is a mid-range to upscale retail department store chain in the United States in 29 states.…

    • 298 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Biology as Unit 2 Revision

    • 3338 Words
    • 14 Pages

    Risk – A measure of the possibility that damage to health will occur as a result of a given hazard…

    • 3338 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Risk or threat is common and found in various fields of daily life and business. This concept of risk is found in various stages of development and execution of a project. Risks in a project can mean there is a chance that the project will result in total failure, increase of project costs, and an extension in project duration which means a great deal of setbacks for the company. The process of risk management is composed of identifying, assessing, mitigating, and managing the risks of the project. It is risk management that drives the decisions that may affect the development of the business capability and also the management of the project. . Issues differ from risks, as risks relate to the events that could be revealed or emerge and end up affecting the project's scope, budget, business performance, management objectives and schedule. Risks are measured in accordance to their most probable chance or chances of occurrence and the way that they can impact the program (Hillson & Simon, 2007). Risk can be defined as any kind of trepidation that could significantly impact the capability of the project to meet its scope, budget, change management, business performance objectives, and schedule.…

    • 1150 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    IS3110 U1L1

    • 1084 Words
    • 5 Pages

    Lab #1 – Part A – List of Risks, Threats, and Vulnerabilities Commonly Found in an IT Infrastructure…

    • 1084 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    According to the PowerPoint presentation “A digital security risk is any event or action that could cause a loss of or damage to a computer or mobile device, software, data, information, or processing capability.” Therefore, some examples of digital security risks include unauthorized access and use, malicious internet and network attacks, hardware theft, system failures, software theft, and information theft. Additionally, sources of digital security risk are hackers, crackers, script kiddies, corporate spies, unethical employees, cyber extortionists, and cyber…

    • 541 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It 280 Final Paper

    • 7327 Words
    • 20 Pages

    How can the computer’s we use every day affect the environment and the people that use them? There are both positive and negative repercussions from using computers in our everyday lives. The computers that we rely on in our daily lives can be dangerous. We have to be cautious of how computers are disposed of when they have reached the end of their life cycles.…

    • 7327 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 4 Individual Project

    • 623 Words
    • 3 Pages

    * Competitive advantage is lost because there is no creative or enhancing component to the system…

    • 623 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    UNIT 3 - P1 P2 M1

    • 2611 Words
    • 9 Pages

    When working in a health and social environment, it is important that the surrounding nature is safe and free of any potential harm. A hazard is something that can possibly cause you this danger. Hazards range from something being misplaced to a broken object. When identifying a hazard, risk assessments would take place to find out the best and quickest solution to prevent any danger. The definition of a risk is the probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through preemptive action.…

    • 2611 Words
    • 9 Pages
    Better Essays
  • Good Essays

    I would like to start off by saying that there are various threats when discussing about computer security the word threat would mean something that can indicate a danger when in relation to computer security. In this task I will be showing the Malicious damage, counterfeit goods, (software/hardware) human errors, phishing and hacking, theft of equipment, threats related to e – commerce and technical failure.…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Any event that causes damage to information resources, whether it is a computer virus, natural disaster or system failure could be devastating to an individual (i.e. identity theft), company, its customers, suppliers and shareholders. Failing to do so may threaten the survival of the company itself.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Good Essays

    202.3.2 Describe the risks and possible consequences for children and young people using the internet, mobile phones and other technologies.…

    • 1127 Words
    • 5 Pages
    Good Essays