Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Research Paper:
Risk and vulnerability analysis
Risk can be defined as a prediction of future events and their outcomes and consequences. Initially, as these predictions are being made, there is no guarantee that these event will actually occur. At this point, it becomes vital to apply probabilities in order to determine the likelihood of the event occurring. Risk analysis, therefore, is a process of describing risks involved in any situation or organization. Vulnerability on the other hand, tends to focus more on the consequence an event will have on the organization if it occurs. It combines, therefore, the aspects of uncertainty of the event and the consequences that come with it (Lewis, 2006).
Process used to analyze threats
US-VISIT is a department within the Department of Homeland Security (DHS) that enhances the department's mandate of providing security to the citizens of U.S.. U.S.-Visit's main objective is to provide biometric services to other departments and institutions of the federal, state and local government. These biometric services include mostly digitized photograph and fingerprints. Mostly, this information is retrieved from entry points into the country such as airports and also at the Visa issuing officers across the world. Therefore, with this information at hand, it is possible for the immigration offices to determine the eligibility of international travelers to be issued with an American visa. This process is very important in preventing identity theft and denies criminal elements from gaining access into the U.S. Moreover, it becomes easier to identify individuals who may be staying in the U.S. illegally or have overstayed beyond the time they were granted permission to be in the U.S. Therefore, the U.S.-Visit department is very crucial since the information it avails for the various departments assists in decision making and legislation of relevant policies (Homeland Security, 2012).
Since this department holds sensitive and private information, it becomes highly susceptible to risks associated with privacy (DHS, 2004). These threats have been identified and categorized into four major groups as shown in the table below:
Table 1: Risks to privacy of information at the U.S.-VISIT
Type of Threat
Unintentional threats (posed by insider)
These may include mistakes in the design of information systems, its development, configuration and operation. Some errors are also committed by employees of the various institutions that store this information. This may happen physically, for example when an employee leaves documents where they can be seen. As such, confidential information can fall into the wrong hands.
Intentional threats (from insider)
Actions involving the incorrect use of authority and disregard of regulations. These may include browsing for information that is confidential or deleting information from a workstation.
Intentional and unintentional threats from authorized outsiders
These threats include misuse of authority to access confidential information with malicious intent and circumventing procedures to gain access to information systems without proper authorization. Flaws in policies and system hiccups can lead to unintentional access to confidential information.
Intentional threats from unauthorized outsiders
Threats may be electronic, personnel attacks, and physical attack. These entails actions such theft of information equipments, hacking and tapping of communications and social engineering in general.
Source: U.S.-VISIT Program, Increment 2: Privacy Impact Assessment; In Conjuction with the Interim Final Rule of August 31, 2004.
The threats indicated in table 1 were identified through the process of information life cycle. At all the stages of the cycle; collection, use, processing, and destruction, issues are analyzed and threats to privacy identified (DHS, 2004).
Operational risks mainly focus on failures within an organization that are intentionally committed. For example, a hacker can cause an interruption in the ICT system within the organization leading to losses and security threats. Intertwined here is the cause analysis which is related to the threat identification process. Figure 1 gives a comparison of the threat identification process and the cause analysis process.
Fig.1 A comparison of the threat identification process and cause analysis process
Threat identification process
Cause analysis process
Discussion of uncertainties
Discussion of causes
Discussion of probabilities
Discussion of scenarios
Identification of scenarios
It is also crucial to analyze the resources at the attacker's disposal and this should include issues such as the resources needed by the attacker to carry out…[continue]
"Risk And Vulnerability Analysis" (2012, June 02) Retrieved December 8, 2016, from http://www.paperdue.com/essay/risk-and-vulnerability-analysis-111146
"Risk And Vulnerability Analysis" 02 June 2012. Web.8 December. 2016. <http://www.paperdue.com/essay/risk-and-vulnerability-analysis-111146>
"Risk And Vulnerability Analysis", 02 June 2012, Accessed.8 December. 2016, http://www.paperdue.com/essay/risk-and-vulnerability-analysis-111146
Threat Identification The threats How the threats are detected Ever since the September 11, 2001 terrorist attacks, businesses have had to critically rethink on the level of adequacy of their disaster recovery arrangements in relation to their business continuity plans as noted by Lam (2002,p.19). The September 11, 2001 tragedy effectively highlighted the importance for organizations to continue with their commercial operations even under the most exceptional of circumstance. My business which has
Risks and Vulnerability Factors County Demographics The two counties I selected were Shelby County in Tennessee and Orleans County in Vermont. In 2011, Shelby County experienced $2,000,000,000 in property damage due to flooding on May 1, 2,470,000 in property damage due to severe storms and thunderstorms beginning on April 19, 150,000 due to flooding beginning on April 27, and $20,000 in property damage beginning April 26. During all of these disasters there
Social Vulnerability Analysis Compare and contrast your findings based on your research and provide a summary. Describe the correlation between environmental and socioeconomic risk and vulnerability for the counties you selected. This is Part III of the Social Risks and Vulnerabilities Project. St. Lawrence County, New York State and Missoula County, Montana were chosen from the Hazard Vulnerability and Risk Institute web site because they have similar population size but are from
Education -- Social Risks and Vulnerabilities This is Part I of the Social Risks and Vulnerabilities Project. St. Lawrence County, New York State and Missoula County, Montana were chosen from the Hazard Vulnerability and Risk Institute web site because they have similar population size but are from different geographic regions (Northeast vs. Northwest). The data regarding their official web sites and U.S. Census data follow. Lawrence County, New York State (Hazards &
This means that you must train employees how to identify various forms of phishing. At the same time, you must implement some kind of security procedures that will place a restriction, on how personal information is distributed. For example, employees could be trained in spotting various kinds of fictitious emails. However, when they run across an email like that is requesting information, there would be a procedure where the
Risks of Climate Change THE RISK OF CLIMATE CHANGE: IMPLICATIONS FOR ARCHITECTS AND ENGINEERS Climate Change Impacts on Engineering Infrastructure Key Impacts on Water and Resources Risk Management Analysis Coping Methods Possibility And Probability Theories Recommendations And Guidelines For The Vulnerability Of Climate Change Impacts Using Risk Management Methods And Analysis THE RISK OF CLIMATE CHANGE: IMPLICATIONS FOR ARCHITECTS AND ENGINEERS This work examines climate change in relation to impacts upon infrastructure, utilities, and water in relation to the
Phishing Spear Phishing and Pharming The following is intended to provide a very brief overview of examples of some the most dangerous and pervasive security risks in the online and networked world. One of the most insidious of identity theft is known as phishing. The term 'phishing' refers to the practice of "fishing for information." This term was originally used to describe "phishing" for credit card numbers and other sensitive information