Information System Vulnerabilities: Risk Analysis of Samsung Company

Verified

Added on  2023/06/10

|6
|878
|155
Report
AI Summary
This report provides a risk analysis of Samsung Company's use of information systems, focusing on vulnerabilities such as phishing attacks and Denial of Service (DoS) attacks, as well as potential excess costs. It highlights the problems that can arise from these vulnerabilities, including data breaches, loss of client trust, and hampered technological innovation. The report concludes that despite these disadvantages, Samsung has been successfully using information systems with high robustness in their networking system. The analysis emphasizes the importance of robust security measures and significant investment in information system infrastructure to mitigate risks. Desklib offers students access to similar solved assignments and study resources.
Document Page
Running Head: RISK ANALYSIS OF AN ORGANIZATION
Risk Analysis of an Organization
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
RISK ANALYSIS OF AN ORGANIZATION
Table of Contents
Introduction......................................................................................................................................3
Vulnerability due to usage of Information system..........................................................................3
Problems caused due to vulnerability present in Information System............................................3
Conclusion.......................................................................................................................................4
References........................................................................................................................................5
Document Page
2
RISK ANALYSIS OF AN ORGANIZATION
Introduction
The organization that has been chosen for performing risk analysis is Samsung Company.
Samsung Company has been using information system for processing of their day to day activity
for completing their task. This repot will discuss about risks that will be approaching the
organization due to usage of information system in regular basis.
Vulnerability due to usage of Information system
Major vulnerabilities that occur due to usage of Information System are as follows: -
Phishing Attack
Dos Attack
Excess cost (Pearlson, Saunders & Galletta, 2016)
Problems caused due to vulnerability present in Information System
Phishing Attack: Mobile and networking organization musts be having a robust
framework. In case of using information system, data that is transferred through this framework
can be accessed with the help of proper decryption technique. This ensures the fact that
imposters can gets access to data that are stored in the networking system (Cassidy, 2016). In
case proper encryption of data that is being passed through the network is not done, imposters
can easily get access to the data that are required to get access to the counts of the clients. data,
imposters can fake identity and represent the genuine client. This leads to the fact that conflicts
are created between the employees of Samsung and their clients. Conflicts between internal and
external stakeholders of Samsung causes loss in brand loyalty of several clients towards the
organization. Withstanding the issues regarding security, phishing attack caused due to
information system also deals with lack of privacy maintenance. Data of one department can be
Document Page
3
RISK ANALYSIS OF AN ORGANIZATION
accessed by another department. This might cause chaos in Samsung Company. This might be
one of the reason that usage of information system is not used in a very high rate. Gaining of
password illegally can be system, ta major problem in case that can be caused due to phishing
attack. By gaining password of the networking imposters can at on behalf of the genuine client
and the client will prove to be the sufferer. Due to this fact, its external stakeholders will lose
their trust from Samsung leading to the fact that they will tend to take support of organization
with higher robustness.
DOS attack: Samsung might be facing Denial of Service Attack, leading to the fact that
he genuine clients will not be able to get access to the server. This phenomenon will decrease
efficiency in functioning of clients who uses the hardware provided by Samsung. DoS attack is
considered as one of the major reason that acts as the major reason of denial of using information
system. In case of lack of robustness, imposters might keep on sending authenticated requests
that has invalid return and server being weak in nature will keep on searching the address and
hence genuine clients of Samsung will find the server busy.
Excess cost Issues: Installation cost is very high as installing the same includes the fact
that data that is required by the entire office is stored in this framework. This is the reason that
robustness of the platform is very essential. To increase robustness of framework proper
investment must be made. An investment of around $50,000 is needed (Laudon & Laudon,
2015). This huge amount which is invested by Samsung Company will not be directly adding up
with the outcome of the business industry. In case this investment is done in manufacturing of
the product, increase in turnover can be expected. Innovation in technological advancement is
hampered due to this cost in installation of the same.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
RISK ANALYSIS OF AN ORGANIZATION
Conclusion
Despite all the disadvantages that are present in Information management, the usage of
information system has been growing exponentially with respect to time. Samsung Company has
been successfully using Information system without any issues and robustness of their
networking system is also very high.
Document Page
5
RISK ANALYSIS OF AN ORGANIZATION
References
Beynon-Davies, P. (2016). Information Systems Development: an introduction to information
systems engineering. Macmillan International Higher Education.
Cassidy, A. (2016). A practical guide to information systems strategic planning. Auerbach
Publications.
Laudon, K. C., & Laudon, J. P. (2015). Management information systems (Vol. 8). Phishing
attack.
Pearlson, K. E., Saunders, C. S., & Galletta, D. F. (2016). Managing and Using Information
Systems, Binder Ready Version: A Strategic Approach. John Wiley & Sons.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]