Preview

Kenneth Sims IS3230 Unit 2 Global Acces

Satisfactory Essays
Open Document
Open Document
406 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Kenneth Sims IS3230 Unit 2 Global Acces
Kenneth Sims (13740642)
IS3220 Unit 2
Global Access Control Case Study

Global Limited has a reputation of being one of the world’s leading providers of infrastructure information systems, software, and services around the world. They are in need of a better business and security practices. They have identified a problem which has been likened to a game of Whack-a-mole. To help with its security problem, Global as called upon the knowledge of CIS-its own Security Division. One of the first steps is to understand what information is critical to the business initiatives. Global Cadence is front-end for over 40 applications and has for 200,000 registered users. Global is working to minimize its impact.
What is the significance of compliance and financial reporting from an insecure system. Its purpose is to give investors more confidence in the financial reporting. Ignorance of a vulnerable system is no longer a defense because top, SOX has driven significant spending on IT and IT security. An insecure systems is the life line of a Company. Without it no assets are safe.
Influence of risk management process which have made Global fulfills in goals. Understanding Globals goal was part of the problem, once they understood then it was simply following a risk management plan which pertains to these items. Most critically, risk management plans include a risk strategy. Broadly, there are four potential strategies, with numerous variations. Projects may choose to:
Avoid risk — Change plans to circumvent the problem;
Control/Mitigate risk; — Reduces impact or likelihood (or both) through intermediate steps;
Accept risk — Take the chance of negative impact (or auto-insurance), eventually budget the cost (e.g. via a contingency budget line);
Transfer risk — Outsource risk (or a portion of the risk - Share risk) to third party/ies that can manage the outcome. This is done e.g. financially through insurance contracts or hedging transactions, or operationally through

You May Also Find These Documents Helpful

  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Global Limited is a global provider of infrastructure information systems, whose services cater to a wide range of industry sectors. One of Global Limited’s business objectives is information security for their clients. In order to provide their clients with information security, Global Limited has utilized a risk management approach to protect their client’s information.…

    • 515 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    MU1 Assignment 2

    • 1726 Words
    • 6 Pages

    The impact of the risks on global business it is dramatic in our days, changing the entire look of the industries and financial services. Some risks could be anticipated and identified but some could not. Companies now are using more and more key steps and principles to better manage the risks by;…

    • 1726 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Acc 544 Internal Control

    • 800 Words
    • 4 Pages

    The insurance approach is generally used to ensure the acquirement to transfer certain types of risks that could affect the business property, the business assets, and affect the employees (McCarthy, 2004). The insurance approach used as a tool to prevent business losses; in addition, it is more like a financial risk tool than management risk tool. This approach will diminishes the impact of the losses, protecting the business assets from potential losses, therefore, making the insurance approach more reactive, than proactive (McCarthy, 2004).…

    • 800 Words
    • 4 Pages
    Good Essays
  • Good Essays

    * Risk reflects how uncertain outcomes cause loss or injury to a particular individual or group…

    • 1485 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Avoid: Adjust program requirements or engineering limitations to eliminate or reduce the risk. This could include; funding, schedule, or technical requirements.…

    • 2075 Words
    • 9 Pages
    Better Essays
  • Good Essays

    LAB 3

    • 531 Words
    • 3 Pages

    Risk planning is developing and documenting organized, comprehensive, and interactive strategies and methods for identifying risks.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Developing a risk management plan leans heavily on a bold commitment by all stakeholders. The stakeholders need also to understand the roles and responsibilities related to the determined risks. As with any project these risks will vary depending on the type of projects along with what the project is dealing with. The project manager must understand that all projects should be approached with a clear thought process and not bring previously used mind sets to a new project. Clear and fresh minds will help to discover new risks and bring immediate attention to unusual or unfamiliar elements and concerns.…

    • 1195 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The concept of insurance is based on spreading the risks; it does not necessarily mean the risk will happen but chances are that it might happen. The concept is on taking…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In this organization a continuous quality improvement committee meets every morning to go over every new patient, patients that are due for their quarterly or annual review, and any patients that have had any issues over the last 24 hours. The committee works together…

    • 958 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Quiz 2

    • 861 Words
    • 4 Pages

    | D. managers generate a wide array of decision options and select the one that meets all decision criteria…

    • 861 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Risk Financing

    • 3009 Words
    • 13 Pages

    Risk imposes costs in two broad forms – loss costs and the costs of uncertainty. Risk financing attempts to mitigate the impact of these costs by structuring the availability of funds to pay claims, aid recovery and enable the organization to maintain financial stability as it moves forward towards its mission. How risk financing occurs can vary. At one end of the scale, fully self-insured entities retain responsibility and, if risk-related costs arise, the entity directly bears those costs. At the other, fully-insured entities transfer the direct responsibility for bearing risk to an insurance company, trading regular losses (the premiums paid) to avoid the potential of large and irregular losses (claims payments). CIS’ pooling programs occupy a middle ground. They enable entities to retain losses up to some pre-determined level; then to share the cost of losses within a mid-layer, and then to transfer risk above the pooled layer by securing reinsurance up to available limits. In reality, most local governments finance the cost of risk through a combination of retention, sharing and transfer. By design or default, a local government entity’s risk-financing portfolio will almost always contain a self-financed component. Losses within stated sub-limits or above the overall limits of coverage are retained by the entity. They may also choose to retain lower levels of risk. For example, members in current CIS pools reduce their contribution levels by using various deductible levels, from $1,000 to $125,000, to pay the first part of some or all losses. In reality, what is being shared or transferred is the timing risk associated with a loss. Most conventional risk transfer (insurance) or risk sharing (pooling) programs provide a smoothing effect that protects an entity from the risk of not having sufficient funds on hand at the time a loss occurs. When risk financing occurs – before, during or after resources are needed - is another variable. Guaranteed…

    • 3009 Words
    • 13 Pages
    Good Essays