Risks and Vulnerabilities in Online Data Paper

Added on - 19 Sep 2019

  • 13

    pages

  • 2464

    words

  • 64

    views

  • 0

    downloads

Showing pages 1 to 4 of 13 pages
Risks and VulnerabilitiesComputingStudent Name:Student ID:Course Name:Course ID:Faculty Name:University Name:
Table of ContentsIntroduction................................................................................................................................2Research Aim and Objectives................................................................................................2Risks and vulnerabilities of online data.....................................................................................2Role of an organization in maintaining data privacy and security.............................................6Conclusion..................................................................................................................................9References................................................................................................................................11
IntroductionThe paper is concerned with the assessment of the risks and vulnerabilities of online datawithin an organizational setup. Companies operate in challenging environment withnumerous internal and external threats. Threats are of different forms and can be associatedwith any organizational function (Parakh and Kak, 2009). If the goal is to ensure effectiveand efficient functioning of the organization, then it is important that the risks are identifiedwell within time and effective measures are taken.This paper will focus on the risks and vulnerabilities associated with the online data stored bythe organization. Moreover, the role of the organization will also be assessed in maintainingdata privacy and security. Threat to online data security is increasing day by day with theadvancements in the technological elements. The identification of these threats on thephysical and virtual aspects of the system can help the organization in formulating strategiesat the right time.Research Aim and ObjectivesThe aim of this paper is to identify the threats associated with the online data security and theactions an organization can take safeguard their online data. The objectives of this paper areto identify and analyse fifteen risks and vulnerabilities of online data for the organizationalong with the fifteen ways organizations can adopt for the safety.Risks and vulnerabilities of online dataThis section is concerned with the identification and analysis of the risks and vulnerabilitiesof the online data of the organization.1.Default passwords in-use
The use of default passwords within the system allows everyone aware of the defaultpasswords to get unauthorized access to the system. The employees or the managementwithin the organization do not change the passwords out of laziness (Kaufman, 2009). Inmost cases, they do not consider it has a major security concern. It turns into the major riskarea.2.Poor disposal of storage mediaThe employees of the organization disposing the storage media without any appropriatemeasure can lead to the leak of the sensitive and business critical information to thecompetitors. The methods such as simply throwing away the non-functioning devices are notthe appropriate method. If the storage media is not working then it does not mean thatinformation stored in it cannot be retrieved.3.Inadequate security awarenessIn most cases, the employees working within the organization are not aware enough about theways to store and use the information safely. In some cases, the lacklustre attitude of theemployees converts into risky situation such as poor upkeep of system passwords, sharingcritical information to unauthorized employees within the organization, and others.4.Insufficient software testingThe implementations of the new software are regular in organizations that are softwaredependent. As the organization considered for the study is software dependent for most of itsactivities, the testing part is a necessity (Pfleeger and Pfleeger, 2002). The lack of appropriatetesting leaves loopholes within the system, which are later utilized by the unsocialindividuals.5.Inappropriate access control policy
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document