Unintentional Security Risks

Improved Essays
There are many risks in the world. Risk can be defined as the degree of probability of loss. Risk could also be referred to as a threat. In the information technology world there are many threats that are known and can be anticipated. There are measures that can be taken to prepare for certain threats. Hardware failure is a threat that cannot be anticipated. Typically, there is a backup plan in the event hardware that fails but it cannot be predicted. The only thing that can be done is have a plan for recovery. These plans usually use some type in data backup software that is configured to do daily and weekly incremental backups as well as a weekly full backup. There is the risk of human error. Human error can cause hardware to be …show more content…
There can be data lost by unintentional means. When entering information, it is possible that a missed keystroke can throw off the accuracy of that information. While this may not be intentional it is very possible that it can be disastrous. If a backup procedure is not completed correctly it can cause a loss of date in the event that a system fails. These have been a couple examples of what can happen with some of the data. Unintentional security threats can be caused by humans as well. A growing number of companies are implementing security policies that employees are supposed to follow. This can cause an unintentional threat if employees are not trained on the specific policies (Sourav Bhuyan, 2013). It does no good for policies to be implemented if there is no instruction on what the policies mean. This could be as simple as a clean desk policy. Many people have passwords written down and available to be seen at computers because the password security policy may cause it too difficult to remember. It should be common sense that passwords should not be written down and in the open but there are people who just do not understand the security concept until it is thoroughly explained to them. Evaluating the password security policy may need to be done as

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 3 Paper

    • 985 Words
    • 4 Pages

    Recommended Kernel Custom kernel can be fantastic for organizations that need to utilize only one or minimum services and applications for their organization. Open source codes of Linux distributions make it possible for Linux administrators to configure kernels for exactly what the company needs. The downside to this is that you would have to employee a Linux administrator adequate enough to configure and update Linux for the company full time.…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Those users essentially have “the keys to the building,” and at any time that a key should go missing, or is destroyed it is also imperative that each instance is annotated into a log, and immediately replaced as soon as possible. Repeat issues from the same individual should be considered for removal from the privilege of key access. PDA/Mobile Device…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    ISSUE Under Florida statutes and cases pertinent to inadvertent disclosure, is Mr. Beene required to return the privileged documents when (1) the products liability team inspected each document included in the discovery; (2) the amount of inadvertent disclosures was miniscule; (3) the degree of disclosure was rather small; (4) Mr. Fitzgerald requested the return as soon as he became aware; and (5) the client has a right to prevent disclosure of confidential communication, as well as an attorney having a responsibility to notify an opposing firm of reasonably determined privileged communication? BRIEF ANSWER Yes.…

    • 2133 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    The loss of personal data, an example of this would be the recent transgressions of the ministry of justice. In 2015 the ministry of justice failed to safeguard sensitive information about 2,935 prisoners. A hard drive containing information about the prisoner’s links to drug crime, possible leads to organised crime rings and details about the prisoner’s victims and visitors. This hard drive wasn’t encrypted so the information could be easily read by anyone, and so all the personal details could have been leaked or sold on. This incident led to a hefty fine and the result was better safeguarding practice.…

    • 684 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    a) catastrophic failures. If the computer system fails, stored information may be unavailable for an indeterminate time. Paper records fail one chart at a time. On the other hand, if the average paper chart is unavailable up to 10 percent of the time,f that would be equivalent to a 10 % downtime for the average patient. http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3270933/ b) increased medical errors.…

    • 276 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Did you know that the average cost of a typical data breach is $5.4 million in the United States? A data breach can take a toll on a company of any size and consumers alike, which is why it is so important for both consumers and companies to take necessary precautions to reduce the risk of breaches. Security Breaches have a compound impact on both consumers and businesses. Consumers shop with companies under the faith that their personal information will be protected. When a security breach occurs, the consumer faith maybe broken and they may discontinue to do business with them in the future.…

    • 794 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Vulnerability to me is the possibility of being attacked or harmed,either physically or emotionally. There was this time i felt vulnerable when i lost one of my friends i went to school when i was in 2nd grade i moved away and didn't know he had cancer.i came back several years later and found at he had cancer when i was in 7th grade he was in 6th because he got held back. I felt so bad for him because the cancer made him really sick and miserable and he gained lots of weight. When ever i saw him in the hallways he always try to smile no matter what pain he was in or how bad his day was. Whenever you say him he would make you smile.…

    • 324 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    As I was scrolling through Ted Talks I came to a video called “The Power of Vulnerability" and that is how I found this quote. This quote is trying to explain that when we finally have the courage to say that we are imperfect and that it is okay to be imperfect, we will be nicer to the people around us. Accepting yourself for who you are can change your life because you can finally let go of who you think you need to be and practice on being yourself, so you can expand on a foundation of self-acceptance. Appreciating yourself will lead you to be kind to others and helping people who need your help, whether it is a homework problem for geometry or problems in their personal life. Also, when you do not have any internal problems, you can better…

    • 235 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Flight centre is a successful company, found in many locations around the world in which they help customer’s book travels into which destination they desire. This includes in managing, flights, holidays, hotels, etc. Flight Centre accommodates to a variety of customers. In having a large and vibrant enterprise and a board of directors who engage in discussions on keeping Flight Centre at its greatest. Accordingly, Flight Centre manager’s needs to ensure that objectives being discussed are efficient for not only short term but long term scenarios need to be focused on in addition.…

    • 764 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Introduction In the first two chapters of Resilient Leaders, U.S. Army Major General (Retired) Robert Dees describes many situations that molded his resilient leadership style. Those who serve in the military have many opportunities to sharpen their leadership skills, especially for commanding officers.…

    • 970 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Volkswagen did not take into account the reputational damage that would occur, the fact that they would lose numerous amounts of customers due to their dishonesty as a result of them cheating on emission tests. They also did not take into account the financial risks, such as loss of earnings due to customer loyalty loss and the financial compensation that had to be paid out to their customers who purchased these cars. It conveys how important the role of risk management plays in organisations today. If Volkswagen went through its production process correctly it would have been more confident in predicting how this computer software would have positively or negatively affected the organisation. As in Nancy Leveson article she says “For example, increasing the reliability (reducing the failure rate) of a tank by increasing the burst pressure –to-working pressure ratio may result in worse loses if the tank does rupture at the higher pressure.”…

    • 1358 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Boeing is an Amercian multinational cooperation that offers aircraft and product support services (Boeing: The Boeing company, no date). Being in the aircraft business involves a lot of risk unless someone is not careful and decisions are not made through careful and accurate analysis. They need to be on top of their game at all times ensuring safety of passengers and to uphold a good reputation to be able to be successful in the industry, in the long run. Risk comes in a number of different ways and are often unexpected. Risk management is fundamental to all business activities.…

    • 862 Words
    • 4 Pages
    Improved Essays

Related Topics