University Project: Risk Assurance Management Report on Malware

Verified

Added on  2022/10/03

|3
|437
|11
Report
AI Summary
This report focuses on risk assurance management in the face of increasing cyber threats, specifically malware attacks. The scenario highlights the vulnerability of companies to malicious software like worms, viruses, and Trojan horses that can disrupt computing and information infrastructure. The report underscores the importance of protecting privacy, information integrity, and resource availability. It references a business impact analysis which highlights the need for strong anti-virus software and firewalls, along with employee awareness programs. The objective is to minimize the impact of high-level threats and protect the company’s information store. The report emphasizes the need for a comprehensive information security plan to mitigate the risks associated with malware and its potential impact on an organization's operations and data security.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: RISK ASSURANCE MANAGEMENT
RISK ANALYSIS OF MALWARE ATTACK
[Enter Name of the student:]
[Enter Name of the University:]
[Author Note:]
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1RISK ASSURANCE MANAGEMENT
Risk analysis and management of information store in case of malicious
software attack –
In modern information management, the companies associated with the storage of
information are vulnerable to the attack of malicious software like Trojan horses, worms and
viruses which effects the entire company and its employees. In the organization the important
credentials of the employees as well as the company are stored in the individual computers as
well as the computer server mainframe of the organization. However in the recent days with the
increase in the number of malware attacks over the internet, the company information store has
become more exposed to the viruses, worms and Trojan horses (Rudd et al., 2016). These
malwares are spread generally through the internet via email or other attachments which when
downloaded affects the computer of an individual. These worms or viruses have the ability to
self-replicate and spread into the entire network resulting in the loss of important files and even
permanent damage to the files or the network.
The attacks by the malicious softwares and worms can heavily effect the company’s
information store and thus an information security plan must be developed in order to maintain
the data securely in the company’s information store. The business impact analysis conducted by
the external consultant has revealed many loopholes in the company’s system which must be
avoided. Strong anti-virus softwares should be immediately installed in every individual systems
and proper firewalls should also be maintained (Aziz, 2014). The employees should also be made
aware of such malicious websites and emails which they should not visit or download. By the
application of these, the low level threats can be avoided and the impact of the high level threats
can be minimized up-to a great extent.
Document Page
2RISK ASSURANCE MANAGEMENT
Reference
Aziz, A. (2014). U.S. Patent No. 8,689,333. Washington, DC: U.S. Patent and Trademark Office.
Rudd, E. M., Rozsa, A., Günther, M., & Boult, T. E. (2016). A survey of stealth malware attacks,
mitigation measures, and steps toward autonomous open world solutions. IEEE
Communications Surveys & Tutorials, 19(2), 1145-1172.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]