Preview

Jmz Memorandum

Good Essays
Open Document
Open Document
823 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Jmz Memorandum
Memorandum
To: Senior Management, JMZ Adventure Ecotours
From: IT Department, JMZ Adventure Ecotours
Date: 4/20/2013
Re: Information Security Risk Assessment Findings
The IT department was recently given the task of performing an information security risk assessment in order to help guide management in prioritizing their approach to mitigating security risks for JMZ Adventure Ecotours. This memo will show the results of that analysis; identifying the greatest IT vulnerabilities and risks within the company, provide recommendations for mitigating the information security risks and provide recommendations regarding the overall information security program at JMZ.
Information Security Impacts
Impacts are the [adverse] consequences on the individual, organization or community resulting from information security incidents:
• Disruption to organizational routines and processes with consequent interruption to trading capabilities, loss of income, etc.
• Direct financial losses through information theft and fraud, whether simply the “background noise” or exceptional and obvious in nature
• Decrease in shareholder value because of negative impact on customer relations, lost sales, and decline in public confidence
• Reputational damage causing lost customers, customer complaints and defection
• Replacement costs for equipment and data damage, stolen, corrupted or lost in incidents
• Reduced profitability, growth and bonuses caused by the background noise of security incidents, control costs and unspecified doubts about the effectiveness of security

Information Security Vulnerabilities
A flaw or weakness in a system’s security procedures, design, implementation or internal controls that could be exploited and result in a security breach, violation of the systems security policy or other impact.
• Software bugs and design flaws, particularly those in mass-market software such as Windows and TCP/IP [usually exploited by hackers and other criminals]

You May Also Find These Documents Helpful

  • Better Essays

    This IT security report will go over the top security IT threats, security considerations, security policies, and awareness training. The security report will help the design team protect the new system from the threats that have been identified during the design phase of the new system. At the end of this report there will be provisions suggested that will help Kudler Fine Foods internal staff to help validate security measures once the new program is up and running so they can keep the system safe from hackers, attacks or any…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sof Optics

    • 1570 Words
    • 19 Pages

    ii. Loss of customers (and sales) due to long customer service wait times or lack of…

    • 1570 Words
    • 19 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    SE578 - Practices for Administration of Physical & Operations SecurityKeller Graduate School of ManagementPREPARED BY: PREPARED ON: APRIL 9, 2011…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    of threats that can have adverse impacts on operations, assets, and individuals. Keeping up with…

    • 3838 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Security + 280 Exams

    • 2838 Words
    • 12 Pages

    | (TCO 1) What is the most common threat to information security in an organization?…

    • 2838 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 4 Definitions  Risk: Probability that an intentional or unintentional act will harm resources  Threat: Any accidental or intentional event that negatively impacts company resources  Vulnerability: Inherent weakness that may enable threats to harm system or networks Risks, threats, and vulnerabilities affect confidentiality, integrity, and availability (CIA). NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    | Describe the security issues that may threaten system performanceThe possible threats to system performance may be: unwanted e-mail (‘spam’), malicious programs (including viruses, trojans) and hackers. Security precautions can be taken beforehand such as use of access controls. We can configure anti-virus software, adjust firewall settings, adjust internet security settings; backup; store personal data and software safely; treat messages, files, software and attachments from unknown sources with caution; download security software updates.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    If there is an Impact on the stakeholders – Employees will not have a safe, secure job and may have to take a pay cut or reduce hours they work, this may lead employees to look into finding a different job where they know the business is successful. They may not get the level of training they have been used to.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lenscrafters Swot

    • 474 Words
    • 2 Pages

    2. This affects the business by losing potential clients and new marketing strategies to achieve a successful name such as the company.…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 5 Article Review

    • 457 Words
    • 2 Pages

    Fraud is a real threat to the financial stability of a corporation and even the country. The legal issues presented in the article show how damaging fraud truly is. Of the over 1,200 companies that filed for bankruptcy in the study, 77.8% had some sort of fraud (Nogler & Inwon, 2011). These numbers show that…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Why Is Whs Important

    • 323 Words
    • 2 Pages

    Non-insurable costs such as lost time injury and reduced productivity, staff replacement, retraining costs as well as loss of business reputation…

    • 323 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The impact of failures to introduce effective change can also be high: loss of market position, removal of senior management, loss of stakeholder credibility, loss of key employees.…

    • 1124 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    -Increase in the cost, disruption of supply or shortage of ingredients, other raw materials or packaging materials could harm our business.…

    • 611 Words
    • 3 Pages
    Satisfactory Essays