logo

Risk Analysis of an Organization

   

Added on  2023-06-10

6 Pages878 Words155 Views
 | 
 | 
 | 
Running Head: RISK ANALYSIS OF AN ORGANIZATION
Risk Analysis of an Organization
Name of the Student
Name of the University
Author Note
Risk Analysis of an Organization_1

1
RISK ANALYSIS OF AN ORGANIZATION
Table of Contents
Introduction......................................................................................................................................3
Vulnerability due to usage of Information system..........................................................................3
Problems caused due to vulnerability present in Information System............................................3
Conclusion.......................................................................................................................................4
References........................................................................................................................................5
Risk Analysis of an Organization_2

2
RISK ANALYSIS OF AN ORGANIZATION
Introduction
The organization that has been chosen for performing risk analysis is Samsung Company.
Samsung Company has been using information system for processing of their day to day activity
for completing their task. This repot will discuss about risks that will be approaching the
organization due to usage of information system in regular basis.
Vulnerability due to usage of Information system
Major vulnerabilities that occur due to usage of Information System are as follows: -
Phishing Attack
Dos Attack
Excess cost (Pearlson, Saunders & Galletta, 2016)
Problems caused due to vulnerability present in Information System
Phishing Attack: Mobile and networking organization musts be having a robust
framework. In case of using information system, data that is transferred through this framework
can be accessed with the help of proper decryption technique. This ensures the fact that
imposters can gets access to data that are stored in the networking system (Cassidy, 2016). In
case proper encryption of data that is being passed through the network is not done, imposters
can easily get access to the data that are required to get access to the counts of the clients. data,
imposters can fake identity and represent the genuine client. This leads to the fact that conflicts
are created between the employees of Samsung and their clients. Conflicts between internal and
external stakeholders of Samsung causes loss in brand loyalty of several clients towards the
organization. Withstanding the issues regarding security, phishing attack caused due to
information system also deals with lack of privacy maintenance. Data of one department can be
Risk Analysis of an Organization_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Consequences of Increasing Threat of Identity Theft
|12
|675
|74

Risk Mitigation
|3
|542
|263

Ethical Dilemma: Issues and Solutions in IT
|6
|1485
|64

Information System Threats Attacks and Defenses
|5
|755
|19

Security Engineering: Cyber Security Threats and Impacts
|6
|1416
|53

BYOD Policy Design for Southern Cross University
|8
|1829
|264