logo

Mitigating Risks and Vulnerabilities in Information Technology

   

Added on  2019-09-19

13 Pages2632 Words379 Views
 | 
 | 
 | 
Risks and VulnerabilitiesComputingStudent Name: Student ID: Course Name: Course ID:Faculty Name: University Name:
Mitigating Risks and Vulnerabilities in Information Technology_1

Table of ContentsIntroduction................................................................................................................................2Research Aim and Objectives................................................................................................2Risks and vulnerabilities of online data.....................................................................................2Role of an organization in maintaining data privacy and security.............................................6Conclusion..................................................................................................................................9References................................................................................................................................11
Mitigating Risks and Vulnerabilities in Information Technology_2

IntroductionThe paper is concerned with the assessment of the risks and vulnerabilities of online data within an organizational setup. Companies operate in challenging environment with numerous internal and external threats. Threats are of different forms and can be associated with any organizational function (Parakh and Kak, 2009). If the goal is to ensure effective and efficient functioning of the organization, then it is important that the risks are identified well within time and effective measures are taken.This paper will focus on the risks and vulnerabilities associated with the online data stored bythe organization. Moreover, the role of the organization will also be assessed in maintaining data privacy and security. Threat to online data security is increasing day by day with the advancements in the technological elements. The identification of these threats on the physical and virtual aspects of the system can help the organization in formulating strategies at the right time. Research Aim and ObjectivesThe aim of this paper is to identify the threats associated with the online data security and the actions an organization can take safeguard their online data. The objectives of this paper are to identify and analyse fifteen risks and vulnerabilities of online data for the organization along with the fifteen ways organizations can adopt for the safety. Risks and vulnerabilities of online dataThis section is concerned with the identification and analysis of the risks and vulnerabilities of the online data of the organization.1.Default passwords in-use
Mitigating Risks and Vulnerabilities in Information Technology_3

The use of default passwords within the system allows everyone aware of the default passwords to get unauthorized access to the system. The employees or the management within the organization do not change the passwords out of laziness (Kaufman, 2009). In most cases, they do not consider it has a major security concern. It turns into the major risk area. 2.Poor disposal of storage mediaThe employees of the organization disposing the storage media without any appropriate measure can lead to the leak of the sensitive and business critical information to the competitors. The methods such as simply throwing away the non-functioning devices are not the appropriate method. If the storage media is not working then it does not mean that information stored in it cannot be retrieved. 3.Inadequate security awarenessIn most cases, the employees working within the organization are not aware enough about theways to store and use the information safely. In some cases, the lacklustre attitude of the employees converts into risky situation such as poor upkeep of system passwords, sharing critical information to unauthorized employees within the organization, and others. 4.Insufficient software testingThe implementations of the new software are regular in organizations that are software dependent. As the organization considered for the study is software dependent for most of its activities, the testing part is a necessity (Pfleeger and Pfleeger, 2002). The lack of appropriatetesting leaves loopholes within the system, which are later utilized by the unsocial individuals.5.Inappropriate access control policy
Mitigating Risks and Vulnerabilities in Information Technology_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents