Preview

The Impact of Weak System Security- Unit 7, M1

Satisfactory Essays
Open Document
Open Document
744 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Impact of Weak System Security- Unit 7, M1
The Impact of Weak System Security

Task: Explain the following statement: “The impact of weak system security is severe”
Weak system security can cause massive problems for an organisation. Holes in security can allow hackers to gain access to an organisations data or its customers’ personal information etc. Once this happens, drastic problems can be caused for the organisation; anything from severe loss of earnings, loss of customers or even bankruptcy if the problem is not taken under control quickly. I will talk about some of the products of having weak system security, and the problems that these can cause.

Loss of Earnings- Weak system security can result in loss of earnings due to the fact that possibly hundreds if not thousands of pounds will have to be spent for the company to hire someone to come and see where the weakness in the system is, and then to actually repair this weakness and ensure that there are no others now or in the future. In addition to this, it is not just the organisation itself that can feel the brunt of the impact of weak security. Employees whose responsibility it is to ensure that there are no weaknesses can also be hit hard. Generally, it is up to managers to ensure that there are no weaknesses in a systems security; or at least to reduce the risk of negative impact/damage on the company. This means that if there is a major weakness is found in the system of an organisation, managers could lose their jobs as a result of negligence etc. This then puts the managers in a situation where they are losing money, not just the company.
Loss of Customers- Weak system security can also result in the loss of customers as people will not want to use a business that has problems with their security as their personal details or information may be at risk. For example, if a bank has a weakness in its security, and this weakness is exploited by hackers; then customers’ information may be stolen and used to purchase goods under their name. This

You May Also Find These Documents Helpful

  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    Next security risks, is the assurance that unauthorized personnel will not have access to vital information. For internal control measures to be effective the company must have internal controls to reduce unauthorized system access. Next are audit risks which contribute to the authenticity of the system chosen. Audit risk carries with it several subcomponents of various risks, such as inherant, control, and detection risks (Hunton, Bryant, & Bagranoff, 2004). Similar to business risk, the opportunity for fraudulant activity to occur contributes significantly to control risk. An auditors failure to uncover…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Use the Web to research and evaluate security products from two competing vendors, such a...…

    • 428 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 242

    • 658 Words
    • 3 Pages

    Threats to the system and information security can be things such as accidentally deleting a file and unauthorised access which may lead to theft of private details. Hackers and viruses also prove a huge threat to a system.…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    These risks have to be borne by the business as a part of its normal business risks. Further it is the responsibility of the company to maintain the highest level of security for its accounting information system. The physical security should be fool proof, authentication system should be the most advanced, virus protection should be the latest, and backup should be done at a safe place outside the premises. Such measures are required to ensure that attacks on the accounting information system like identity theft and loss of irreplaceable data do not take…

    • 838 Words
    • 4 Pages
    Good Essays
  • Better Essays

    itt security final paper

    • 1085 Words
    • 5 Pages

    Richman Investing is one of the top leading investing firms in the United States. In order to stay on top of the competition a few things have to be implemented. Accessing Richman’s intranet and extranet is one of many nice features about the company. Securing these ways to access the network is more than just saying which sites users can and cannot access. It is encrypting data, setting passwords, physically locking doors, and many other very important security measures that need to be thought of. Being 100 percent safe and secure is not achievable but if we follow these steps Richman Investing will be more secure and will remain number one in the United States when it comes to investing.…

    • 1085 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Inherent Risk

    • 417 Words
    • 2 Pages

    Nature of data processing – the more poorly the IT system is made and managed the greated the inherent risk…

    • 417 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Pro Act

    • 278 Words
    • 1 Page

    The effect this has on society is that businesses can be fined a large sum of money if this Act is broken, this means that the business has to ensure that customers data is stored in a safe manor. Once a business has had an ‘incident’ involving data protection then customers of a business can become less confident in using their services in worry.…

    • 278 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The Royal Bank of Canada experienced some fundamental managerial errors in May 2003. It was reported as a major “glitch” that had been caused by wrong configuration during the installation process. A simple problem had severely affected the lives of millions of people. In this essay I will discuss the security and control problems such as the simultaneous upgrade of both the main and back-up systems. This will lead into the strategies management could have used to prevent these problems happening in the first place and what they can do differently in future. I will also explain how management neglected the public relations side of the issue which had customers questioning the reliability and stability of Royal Bank of Canada ultimately leading to disloyal customers. Finally this essay will argue how well Royal Bank of Canada responded to the computer software issue and what they should have done differently to prevent the problem and ease the situation once it had happened. From the errors and mistakes made from the Royal Bank of Canada, other banks and industries can learn how to avoid them. One such bank in Australia is St George, in depth I will discuss the risks of malfunction or abuse customers may experience when dealing with the information systems with reference to relevant case studies.…

    • 2352 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Critical Systems Failure: It is a technological threat. The central point for this threat is single-point system vulnerabilities trigger cascading failure of critical information infrastructure and networks. Respondents consider the risk ‘that a single vulnerability could trigger cascading failure of critical…

    • 595 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Acc1006 Mis Tutorial 1

    • 470 Words
    • 2 Pages

    There are factors other than employees’ integrity that that contribute to obtaining an adequate system security, such as reduce employees’ situational pressure and reduce employees’ opportunities to access the information.…

    • 470 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Business nowadays has big problems in security. There are many cases presenting that crimes and fraud are attacking if the business were already closed and the business establishment have not enough security to prevent a particular crime. Security is one of the important things to consider in a business. It is important across all walks of life to ensure the overall safety and possessions of all individual are comprehensively protected.…

    • 4191 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Sew What Inc. Case Study

    • 1348 Words
    • 6 Pages

    A company will not know what problems to fix or how to make the customers' experiences better if they are not aware of it. She also needs some malware security since her company relies mostly on internet-based technologies. She needs to be prepared incase her system crashes or has glitches, because information can become lost or deleted. A business can become vulnerable to individuals stealing or phishing for customer information.…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Good Essays

    intrusion detection system

    • 2058 Words
    • 9 Pages

    8/5/2010 Paul Apolinar Christian Chavez RJ Favila Arni Paragas Jessica Mayuga Abegail Soñas  Defined by ICSA as:  The detection of intrusions or intrusions attempts either manually or via software expert systems that operate on logs or other information available from the system or the network. IT Security     …

    • 2058 Words
    • 9 Pages
    Good Essays
  • Good Essays

    system security

    • 573 Words
    • 2 Pages

    • Masquerader: An individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account…

    • 573 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Zain

    • 629 Words
    • 3 Pages

    There are some weaknesses. For example, because of the poor corporate governance procedures, the risk management systems have failed. Secondly, boards had agreed a strategy but they didn 't keep under observation if this strategy implements or does not.…

    • 629 Words
    • 3 Pages
    Good Essays