Comprehensive Report on Risk Mitigation in IT and Networking Systems

Verified

Added on  2023/06/14

|3
|542
|263
Report
AI Summary
This report examines the increasing use of information technology and the associated security risks in corporate and daily life. It highlights concerns like unauthorized access, data breaches, and data manipulation, which can significantly harm organizations and individuals. The report discusses preventative measures such as firewalls, antivirus software, one-time passwords, and individual employee passwords. It also touches upon the research methodologies employed, including quantitative methods like surveys and interviews, and qualitative methods like analyzing authenticated literary articles, to understand and address these critical security challenges.
Document Page
Running Head: RISK MITIGATION
Risk Mitigation
Name of the Student
Name of the University
Authors Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2
RISK MITIGATION
Executive Summary
The usage of Information technology in the field of corporate field as well as in daily life
services has been increasing in a very fast rate due to the fact that the global acceptance of the
platform has been gaining popularity among the educated mass as it helps the mass in staying
connected with each other. With the increase on the terms of internet technology issues related to
the security of the networking systems has also been a concern for the corporate sectors that has
been using information technology and digital communication methodologies as their platform.
The major concerns in the field of security for the technological glitches are the massacres that
are caused due to fact of the unauthenticated approach of the imposters that leads to the fact of
gaining access to the data that are not permissible for the imposer ton gain access. This causes
the fact of deforming the data that has been approached by the imposters which causes major
harm the organization as well as the individuals who are related to the company. Another issue
that occurs due to the fact of glitches that are p[resent in the cyber networking platform is that
unauthorized personnel gain access to the persona accounts’ and profiles of individuals that helps
the imposters to steal money from the individuals. Another issue that affects the] organization
the most is the leaking and distribution of data of the company to the organization who acts as
the competition to the company. the most difficult problem that the organization faces dye to the
fact of lack of robustness in the networking system is that the data that is retrieved by the
imposters are often modulated in a negative way and distributed which causes conflict among the
institution member as well as among the employee and the clients of the organization. To prevent
the organizations form the security issues actions are taken to keep the networking platform
protected. The initial prevention that is taken by everyone is installing firewall in their
computing systems. Antivirus are also installed in the computing devices which protects the cp
Document Page
3
RISK MITIGATION
putting devices form particular type of viruses namely the ransomwares and the Trojan viruses.
Applying the technology of one time password for the accessing of n the networking systems
also applied in order to keep the networking system protected. Applying individual password
technology for every employees of the company also applied the networking system to keep the
networking system protected from the imposters. The methodologies that have been applied
during the process of performing the research are both quantitative and qualitative in nature. In
case of quantitative research methodologies like conducting surveys among mass and other
methodologies like interviewing people that have suffered due to cyber attacks have been
performed. In case of the qualitative methodologies the procedure that have been used are like
researching with the help of literary articles that are authorized and the authors of the journals
and the literary sources are genuine and authenticated.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]