Wolftech Case Study

Improved Essays
a. Information Security Risk Assessment System for Wolftech
The risk management is a process to identify risks within organization and to further manage the operations through putting up necessary controls in place. The further importance of risk assessment can be ascertained through fact that about 48% of the 283 companies have been victims of the computer crimes over 12 months’ period. In some other incident the internet worm affected the largest and complex network of computer in few hours.
Wolftech need to protect the information system from any type of unauthorized access, disruption, destruction, recording, inspection, disclosure, use and modification. If the confidential information of the organization is exposed to potential risks,
…show more content…
Software security Wolftech uses range of software provided by third party and can have threat related with securing the data and information of network
4
4
16
The anti-virus softwares and putting up necessary controls in place so that software security can be deployed. This includes putting up firewall and secure patch update from time to time.
Managing personal devices of employee Employee uses personal devices to access official data and information and can have threat related with all forms of external risks 3 3 9 Need to ensure each personal device has separate password protected folders to manage data and all data should be shared on corporate secure line.
Managing data security and back up process The data is presently managed at one of server located at other location therefore there is risk to manage data security and back up 4 4 16 Need to ensure cloud computing and data backup is regularly taken so that data security can be effectively managed.

Further Elaborated Risk Treatment Options
Following are the options to treat the risks faced by the information system of the
…show more content…
So if there would be no proper access control, which in this case study is not observed, so it would be easy for everyone to access every resource of the company. This would even allow the noon-related employees to view the most crucial data or information of the company which may be useful for the competitors. So there needs to be a proper access control mechanism which will ensure the identity of the employee, authorize and authenticate every employee to use the system to perform assigned task on the resources he/she is allowed to use (Fenz, and Ekelhart,

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Each employee should be held responsible for ensuring that their daily backup has taken place without any errors. If errors should arise, an IT Professional such as myself should be notified…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    After analyzing the current situation of accounting firms, it seems that this organization understands the importance of information security but it is severely lacking. This requires to introduce a user training program to make every employee understands the importance of how they behave themselves every day in protecting the company’s network…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Why Collect HR Data

    • 1110 Words
    • 5 Pages

    Data Protection Act This act applies to all organisations that process data relating to their staff and customers. It is the main legal framework in UK that protects personal data. The act contains 8 data protection principles which are: Personal data should be processed fairly and lawfully, this can be achieved by asking the employees to use their information, on the employment contract.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    The Office of Personal Management was established by Theodore Roosevelt is considered to be the father of the cutting edge merit-based administration. Merit is a term which means the value of quality of something or someone. Merit selection ensures that selection is based only on a person's ability to perform the work. Merit selection aims to choose the best person for the job, resulting in a quality workforce. OPM's history, which started with the Civil Service Act in 1883 and formally renamed to the Civil Service Commission.…

    • 1150 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Jacket – X Security Vulnerabilities Analysis of Jacket-X Overview of corporation Jacket – X Corporation is located in a large metropolitan area that manufacturer industrial-grade gloves, safety jackets and other specialized safety equipment. The Chief Information Officer at Jacket-X is concerned about the security procedures that are going on. For the past year, Jacket –X’s Human Resources department has experiencing financial issues. In additional, a member on the sale forces team loaned his son the company laptop without letting anyone know. The laptop was brought back into the building and was connected back to the corporate network before any sale person could perform any antivirus scans on the laptop.…

    • 902 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The basic protection of data depends on update the anti-malware protection, firewall, and encryption. Creating some security awareness programs. All the people should maintain the data confidentiality and data integrity. In each organization…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Proposal for Security Software Name: Jamonte Reed Institution: University of Maryland University College Proposal for Security Software Owing to the cybercrimes threats attempted on Advanced Research Company, it is recommended that the executive should make plans to acquire security software that will protect confidential corporate data from external access. Past events have demonstrated that companies are not secure from cyber attacks owing to the ones that the company has experienced and the recent one that involved a major competitor. In this study, attention is accorded to a description of the recommended security software and its benefits to the company.…

    • 1226 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    1. The message I would have received as a hospital administrator from this video would have been: The importance of keeping my organization's information secure from anyone else not permitted to have my knowledge, and more specifically the knowledge of my patient's care as well as their demographic information. It is my responsibility as a hospital administrator to keep my data secure, and whether that means hiring a IT security company or maintaining a high security software is my responsibility in order to stay within HIPPA guidelines. 2.…

    • 477 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Organizations posses a lot of information, including strategic plans, trade secrets, cost information, legal documents, and process improvements. Of course, preserving the confidentiality the organization’s intellectual property is the basic objective of information security. Protecting the privacy of their customers’ information is also equally important. That means a company and its management team is also responsible in protecting confidentiality and in implementing privacy controls. If they fail in these roles as well as the roles enumerated above, they should be held accountable for the failure or for the successful attack made on their AIS.…

    • 1545 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    Positive ATOM Methodology

    • 1100 Words
    • 5 Pages

    A risk is an uncertain event that may occur in a project and is likely to have a positive or negative impact on the project. A risk is likely to have an effect(s) on at least one of the project objectives (Talet, et al., 2014). A negative risk is likely to have negative impacts and losses to a project, whereas a positive risk is likely to open up new opportunities for a project (Schwalbe, 2014). A risk management process helps to handle the uncertainties and risks related to the project in a more organized and calculated way (Schwalbe, 2014). A risk management process can help to optimize the impacts of a risk if it is not possible to avoid the risk.…

    • 1100 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Acceptable Use Policy

    • 1579 Words
    • 7 Pages

    Executive Summary This policy draft covers the acceptable use policy for information technology including the purpose, scope, rights and responsibilities, and acceptable practices. It describes the policy that will govern employees while using the computers and computer systems as provided the company. The second part of the policy will govern the employees while using their personal devices in the office and at home. This is meant to ensure that the integrity and security of the data are not compromised.…

    • 1579 Words
    • 7 Pages
    Improved Essays