Technology Evaluation and Recommendation In identifying risks, the need determine how assets can be damaged, destroyed, stolen and altered in an organization is the essence of information technology. The risk assessment gives a ground on which to implement security plans in order to protect assets of an organization from possible and impending threats. In order to improve the security of assets against threats, it is important to find out. One, what are these assets that need protection. They include component failure, ‘ unauthorized deletion or modification, misuse of software and hard ware, unauthorized disclosure of information, viruses, Trojan horses, or worms, riots, fires, floods, or earthquakes, penetration (hackers) and software bugs and flaws’, Peter and Thomas (2001). After assessing the risks, the next plan of action for the organization is to plan pro-actively, Layton, Timothy (2007). This involves developing security measures and limitations, and implementing tools to help in the security. This will help protect the “ assets of the organization and employee mistakes” (p. 90) Often, organizations evaluate technology adoption according to how they collect process and distribute data within and outside the organization. This particularly depends on the amount of data to process. For this reason, the organization should consider installing large storage devices that will aid fast processing of information. Most of the organizations have different departments. Data within the organization has to be shared daily basis where some of the data has to be directed to few individuals. An organization is therefore responsible how the information is to be shared (Ronald 2003). In computer, “ security risk assessment planning is very important”. In most circumstances no plan of action can be of any importance unless a risk assessment is performed, Allen and Julia (2001). The risk assessment gives a ground on which to implement security plans in order to protect assets of an organization from possible and impending threats. In order to improve the security of assets against threats, it is important to find out. One, what are these assets that need protection. Two, what level of risk of the assets in question and third, what level of resources the organization has put in place to upgrade the assets and protect them against any risk. According to Allen and Julia (2001), a risk is when a threat tries to harm your computer as a result of the computer vulnerability. Therefore the plans and policies to protect your system after knowing the threats involved are eminent. The following are some of the ways to indentify risks to your system. One, gather all the work-force in your organization and have a brain storming session where-by you list all the assets and their respective threats. This will help to increase security awareness in your organization. There are three sources of these risks: This include: unintentional risks, natural disaster risks and intentional risks (Allen and Julia (2001). This can be illustrated as follow, in the figure below: Source: (Peter and Thomas, 2001). Identifying Risks to the Assets To identify risks, one need determine how assets can be damaged, destroyed, stolen and altered. They include component failure, ‘ unauthorized deletion or modification, misuse of software and hard ware, unauthorized disclosure of information, viruses, Trojan horses, or worms, riots, fires, floods, or earthquakes, penetration (hackers) and software bugs and flaws’, Peter and Thomas (2001). Candidates’ technology based solution The information produced, should be categorized according to it is sensitivity to loss or disclosure. For our client, the following set of informational categories can be used. One, proprietary; in this case for internal use only and also, data should be broken down based on the following requirements: “ confidential, private, sensitive and public. Besides, an estimate of the likelihood of each risk, which is done by, obtaining estimates from insurance companies”. (Peter and Thomas, 2001). Also identify the type of threat and the method of attack. Security threats can be divided into human threats and natural disaster threats. The human threats can further divided into malicious and non-malicious threats. In understanding these threats, it is possible to ascertain the vulnerabilities caused in the exploitation, and particularly which assets are targeted during the attack (Layton and Timothy, 2007). After assessing the risks, the next plan of action for the organization is to plan pro-actively, Layton, Timothy (2007). This involves developing security measures and limitations, and implementing tools to help in the security. This will help protect the “ assets of the organization and employee mistakes” (p. 90) Also, the organization should develop password policies. This password should be kept secret at all times. The use of password should not be compromised in it is use and storage. This means for effective use of pass word, it should be changed periodically, and should be assigned to the user when used for the first time. This can be ensured that the system maintains the pass word data base (Ronald 2003). In conclusion, organizations should ensure that they have different accounts with different access rights. These accounts should adopt unique passwords changed periodically to prevent hackers from invading the organization confidential data. References Allen, Julia H. (2001). The Cert Guide to System and Network Security Practices. Boston Ronald L. (2003). I-formation Security: Design, Implementation, Measurement, and Compliance. London. Layton, Timothy P. (2007). The CISSP Pre Guide (Gold Edition Ed.). London. Peter, Thomas R. (2001). Information Security Risk Analysis. Boca Raton, FL: Acerbic publications
Related Essay Samples
Careers essay example
In this case, the graphic designer is not necessarily own the technology layout of sites, with the exception of those cases where it is narrowly specialized in this area. Web-designer is a specialist in the field of web development and ...
How hard is hardware disease
Following infections spread along the object to countries around the venters, bring forthing abscess and adhesions, in some instances the object will travel through the thorax leting for there to be abscess in the thorax, and during terrible instances the ...
Yuri gagarin term paper
During his flight Yuri Gagarin was awarded the title Hero of the Soviet Union and " Cosmonaut ", was awarded the Order of Lenin. In this case solved one of the biggest challenges at the time - the need for ...
Free essay on work completed
The California Travel Planning Guide aims to provide prospective visitors of Disneyland with information about the theme park, particularly about the activities that they can do, the places that they can go to, and the souvenir items that they can ...
Example of cumulative acquisition of knowledge generates academic and scientific advancement essay
Abstract This essay explores the nature of the cumulative acquisition of knowledge and the advancement of academic and scientific study in reference to Sir Isaac Newton's quote ' If I have seen further it is by standing on the shoulders ...
Computer engineering culminating
So we decided to go with the lights variable and use that to count the number of times the pushbutton was pressed, such that it would allow the headlight Leeds to shut off the second time the button was pressed. ...
Xml and java 18062
It is likely that the future of web development includes the creation of increasing numbers of programs, which make intelligent use of the data on XML-based web pages. Since there has been a decision to provide a standard Java API ...
Security of ehr
Article Summary al Affiliation: Article Summary Advances and Current of the Security and Privacy in Electronic Health Records: Survey from a Social Perspective by Antonio Tejero and Isabel De La Torre addresses the use of electronic health records in terms ...
Pros and cons of online education essay examples
Education is available to everyone regardless of age or health status.- A student can plan their own time and place of employment, adjust the online training under his employment.- On the webinars it is possible to communicate directly. Thus, considering ...
Free essay on the effects of poverty on children
Poverty stricken children tend to feel the effects of poverty even before they are born. Therefore, a child born weak due to poverty has more chances of giving birth to a weak and unhealthy child in the future.
Smart class essay sample
Introduction: Smart class is a technology which will completely evolve and develop the education system by merging technology with learning the perfect combination and key to success and with the help of Sony and the collaboration of few universities we ...
The pool section of the river
The amount of in-stream cover type present, in the river, poses a threat to the survival of most of the organisms present in the river. The third metric was the Channel morphology that measures the quality of the stream channel ...
Stochastic applications of actuarial models with r coding
It is assumed that the sovereign will remain in their current rating initially, so for all ratings the probability of transition from one rating to another will be zero at time 0, while probability of remaining in the same rating ...
Free case study on reforms that will make public school effective
Despite difference in ideas and opinions about this issue, it is imperative to appreciate the fact that public school system needs reform in order to improve quality of education, nurture and develop diverse skills and talents, embrace cultural diversity and ...
The social impact of the internet past & 184
The Internet is and will continue to become a great impact in our society from its feeble beginnings as a governmental project, to the amorphous network of millions of computers, it is an overriding force in all aspects of society ...
Class student dicussions answers week 4
It is only through the personalisation of user accounts and passwords that an individual may get access to a homegroup file. The report should be done internally and the information should travel through all the channels, i.e, from the head ...
Research paper on computer crime
It is possible to say that with development of the Internet, computer crimes became more diverse, unpredictable and began to develop with a new force. There is a positive tendency and in a result of such law innovations, it is ...
Effects of computer shop in the academic performances
The questionnaire made use of the liker scale to determine the preference of the students towards computer shop use and to the extent to its impact on the academic performance of the students. How about the students who cannot afford ...
Advantages and disadvantages of ict
TRAINING AND DEVELOPMENT The most important role of HR is to recognise the need for providing training to the staff where required, as performance appraisals not only assists in determining the rewards to be given out but the identify the ...
Technology in lives of teenagers
Overview of Subject Matter From personal experiences in and around the classroom, technology has grown over the years and spread to the point where it needs to be enthroned. This is why technology in the lives of teens must be ...
Disadvantages of taking online classes
Potential achievement represents that category that affects users' behaviour in the decision to continue or drop out of a course. The challenges existing in learning a course is one of the main aspects that users consider.
Purchasing computer
Today, people are able to access the World Wide Internet through their cellular devices, Glenn them the opportunity to make the same transactions or do the same research that they would be able to do on their computers; this Is ...
Example of technology
To get rid of the smell of food, boil the bowl of water in the oven with a few drops of lemon juice in it and your oven is ready to use again. Food gets cooked evenly in the microwave ...
Project management life cycle models essay sample
The sequential relationship means that the planning process can not start before the completion of the scoping process, the launching process can not start before the completion of the planning process, the monitor and control process can not start before ...
Cyberbullying intro
Cyberbullying follows children around the clock, and into the safety of their homes. Cyberbullying follows children around the clock, and into the safety of their homes.