Preview

It Risk Analysis Case Study

Better Essays
Open Document
Open Document
4910 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It Risk Analysis Case Study
1.0 Introduction –

Information Technology is vital to every business today, since most businesses today are linked together with high speed broadband networks, high definition screens; superfast computers only make them a treat for a user. So, if the IT fails the businesses suffer huge losses in a matter of minutes for e.g. the London stock exchange has an IT failure it could possibly mean a loss of thousands of pounds every fraction of a second. Every Risk no matter how big or small is a potential threat for e.g. a small cut on the hand could turn gangrenous over the period of time, what are we prescribed to do then, we would lose our limb, IT too is similar. A proper analysis and management is necessary to keep the IT in a good shape. Businesses understand IT as a risky proposition since they believe an IT system might last a while but would invariably die because of the stiff competition. Every time a new technology erupts on the market the one previous to it dies either a sudden or a slow death. For the past 4 decades IT has been a boon to the service industry making itself a slave science by supporting other sciences to grow, but very little effort has been made to log the number of times IT system failed and a even poorer job is done in logging the reasons that led to the failure. Most often the same mistakes are repeated but no serious lesson are learnt. We believe it’s high time we start logging our failures because a shocking 60% of all IT projects fail even today. Normally, IT Risks are detected pretty late which leads to a failure it happens because a proper analysis and assessment is lacking. A good management would always like to know where and how its investment will be used in and hence Risk Management is used to analyse and manage their risks in a more strategized format.

2.0 Risks to the Organisation and its IS/IT

Below is a list of risks that have been identified by us, each list is separated by category, in which each category will list



References: Baratz, A. (2009) Malware: what it is and how to prevent it [online]. [Accessed 15 October 2009]. Available at: . GoogleDocs. (2008) Client Briefing [online]. [Accessed 19 October 2009]. Available at: . TechFaq. (2009) what is Malware? [online]. [Accessed 15 October 2009]. Available at: < http://www.tech-faq.com/malware.shtml>. Yau, T. (2001) Dragon Project [online]. [Accessed 4 August 2002]. Available at: . Yau, T. (2001) Dragon Project [online]. [Accessed 4 August 2002]. Available at: .

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Pm 535 You Decide

    • 585 Words
    • 3 Pages

    * Make a chart of how and when the possibilities of risks are most vulnerable…

    • 585 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bsbohs302B

    • 759 Words
    • 4 Pages

    16. A risk assessment form would show the employees of where the known risk sites are and how to avoid becoming injured…

    • 759 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Criminogenic needs can be described as changeable risk factors, that when reduced, result in reduced criminal behaviour. These needs are termed “criminogenic” because they are empirically related to criminal conduct and when reduced, lead to reductions in future reoffending. Therefore, changes in criminogenic needs have a desired effect on changes in criminal behaviour. In the Risk Assessment case study, a number of these criminogenic needs as well as the “central eight” risk factors are evident contributors to the criminal nature and history of the accused. The first and most important criminogenic need in respect to the case is the Family/Marital factor. The accused believed that his wife had been having an affair and he constantly accused her of infidelity and being seductive with other men. These feelings of insecurity led to many years of constant arguments and assault cases with his wife up until he killed her. This is evident in the fact that the first assault case filed against him was when he was aged 37 and the cases lingered up until the accused was 42. This criminogenic need also directly relates with the family and/or marital “central eight” risk factor. The second most important criminogenic need in respect to the case is the Substance Abuse factor. The substance being abused in this case is alcohol. The accused is of the opinion that his antisocial and violent behaviour is motivated by alcohol abuse. Alcohol substance abuse can also be traced in the impaired driving charges accrued by the accused, which served as one of his previous convictions. Alcohol abuse can also be held responsible for his current state of unemployment as it got him fired from previous jobs. Ultimately, it could be the reason why he does not remember the incidents leading to the murder of his wife because he could have been under the influence.…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The following paper discusses the risk assessment process while explaining the framework, how each phase interrelates, and why the framework is so important in assisting with the risk assessment process. The paper will also discuss some of the innovations that have occurred over the last several years.…

    • 823 Words
    • 4 Pages
    Good Essays
  • Good Essays

    evaluate the risks and decide whether existing precautions are enough or whether more should be done…

    • 1188 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In this assignment I will be assessing the hazards identified in the health and social care setting.…

    • 953 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Asher Farms Inc.

    • 2481 Words
    • 10 Pages

    risks is to perform a PESTLE analysis. PESTLE is an acronym for Political, Economic, Social,…

    • 2481 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Risk Assessment Case Studies Risk Assessment Case Studies document Select one of the case studies as the foundation for this assignment. Once you have selected the case study complete the following assignment:…

    • 213 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Trojan Virus

    • 1500 Words
    • 6 Pages

    Trojan horse is a program which contained a malicious or harmful code inside data that can control or damage the data, such as erasing data in the hard drive and may change computing system into a killing machine. Trojan virus has become common among hackers and the availability of advertising services that permit authors to violate the user’s privacy. 83 percent of the global malware is Trojan virus according to BitDefender from January to June 2009. This paper would generally talk about:    History of Trojan Horse virus, Types of Trojan Horse Virus, How Trojan virus is used to control a computing system or data.…

    • 1500 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    As observed at the 4th International Conference on Global e-Security in London in June 2008, Information Security Risk Management (ISRM) is a major concern of organizations worldwide. Although the number of existing ISRM methodologies is enormous, in practice a lot of resources are invested by organizations in creating new ISRM methodologies in order to capture more accurately the risks of their complex information systems. This is a crucial knowledge-intensive process for organizations, but in most cases it is addressed in an ad hoc manner. The existence of a systematic approach for the development of new or improved ISRM methodologies would enhance the effectiveness of the process (Papadaki et al, 2008). In this review, we examine existing ISRM methodologies, analyse trends in the development of new or improved methods and highlight gaps in research on the subject. The overarching research questions that form the foundations for this study were consequently formulated as follows:…

    • 2806 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    A network of compromised machines (bots) controlled by a bot master Responsible for (non-exhaustive list): Large-scale network probing (i.e., scanning activities) Launching Distributed Denial of Service (DDoS) attacks Sending large-scale unsolicited emails (SPAM) Click-fraud campaign Information theft Shift from a for-fun activity towards a profit-oriented business…

    • 11343 Words
    • 46 Pages
    Good Essays
  • Good Essays

    As companies increasingly rely on the data contained on their computer systems, threats to the data are also growing. Threats to data, or to information, can come in the form of a breach of confidentiality, a violation of integrity, or a denial of availability. These threats can come from various sources including computer hackers with malicious intent, natural or unnatural disasters, the lack of security policies, the failure to enforce security policies and computer viruses. Computer viruses pose as serious a threat to data as can a malicious hacker. In order to thoroughly protect a company’s information, one must focus on protecting against all possible threats, including computer viruses. Although infection of computer systems by a virus is generally unintentional, the possibility of infection is real and without the proper protection, imminent. Computer viruses are designed to spread from one file to another, from one program to another, from one machine to another, and even from one network to another. Viruses threaten the integrity and availability of data. Data have become the backbone of most companies today, and therefore any threat to a company’s data cannot be tolerated. Time, resources and money must be invested to protect a company against the harmful and destructive intrusion of computer viruses. At first glance it would appear that protecting computers from viruses is a relatively simple task. On the surface this task involves selecting an anti-virus software package, installing it, and running the virus scan, rendering the computer virus-free. Unfortunately the process can be quite intricate, and require as much time and effort spent planning as on implementation. An enterprise wide anti-virus initiative involves numerous tasks, which at a high level can be broken into the following phases: planning, implementation and maintenance. Other phases may be identified for any given project and should be included as…

    • 766 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Computer Virus

    • 1863 Words
    • 8 Pages

    In the following report, "computer viruses" will be explained in detail. A lengthy and informative description of the evolution and history on microcomputer viruses will be given, to give you a background of their origin for some understanding of how they came to be.…

    • 1863 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Key risk indicators as well as Key performance indicators play a very important role in dealing with operational risk. This assignment is aimed at educating the reader about Key Risk Indicators (KRIs); which are basic measurements, statistics as well as metrics within the organisation which gives a certain overview about the organisation’s risk position as well as Key performance indicators (KPIs); which are both quantitative and qualitative measures that are being used to see the business’ journey towards achieving its goals and objectives.…

    • 1392 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    • You and your family are at risk of virtual attacks .....................................................................1 • Understanding how the Internet works and the security threats you face....................................1 • What’s a nuisance, what’s a threat ........................................................................................2 • Spyware: It’s the new threat your anti-virus software won’t find ................................................2…

    • 4315 Words
    • 18 Pages
    Satisfactory Essays