Wednesday, May 15, 2019

Security Risk Assessment Coursework Example | Topics and Well Written Essays - 1500 words

Security jeopardize Assessment - Coursework ExampleThere atomic number 18 a variety of risks that a business government faces when it comes to the implementation of a secure information technology system. This includes loss of information, an attack by internet or information processing system viruses and malwares, authorized use of data, etc (Vladimirov, Gavrilenko and Michajlowski, 2010). This paper analyzes the various elements that would make the computer system of a business organization to be vulnerable. It also examines the various measures aimed at protecting the computer system of a business organization.A secure computer system must comprise of three major elements, namely recovery, resilience, and contingency (Calder and Watkins, 2010). below resilience, the critical functions of a business organization and its supporting infrastructure are engineered and designed in a permanent manner. They are designed in a manner that it is impossible for any disruption to attain the functionality of these systems (Bradley and Carvey, 2006). It makes it likely for an organization to maintain its operations in case of a major threat or attack to its computer systems. For instance, a business organization may develop power back up systems, to protect the loss of data or their computer networks from going off, in circumstances where power fails to get along (Harrington, 2005). Business organizations may use solar gadgets and generators to protect their computer systems, in circumstances whereby power may fail.Recovery involves restoring the important features of a computer system or network that failed to function (Bradley and Carvey, 2006). Computer experts may make arrangements aimed at recovering lost data, and making replacements on areas that is needed. This is to ensure that the activities of the business organization are not interrupted in any negative manner (Oppliger, 2000). Contingency involves

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.