This is achieved by conducting a cost basis analysis and then determining if this procedure will help to directly address the various risks facing the business. Once this occurs, is when everyone can see how a particular action will help the firm to realize its operation goals. (Schroeder, 2011) ("What you can and must do to stay Secure," 2011)
After this is when, the management will have a series of different reviews conducted that will determine the overall nature of the threat. At which point, there will be specific recommendation and adjustments made to the company's strategy. Over the course of time, this will help to limit the kinds of information that could be compromised during these types of events. (Schroeder, 2011) ("What you can and must do to stay Secure," 2011)
Discuss the strengths and weaknesses of the cost / accounting procedures applied to risk taking
Bibliography
What you can and must do to stay Secure. (2011). Master Card. Retrieved from: http://www.mastercard.com/us/merchant/security/requirements.html
Schroeder, S. (2011). Master Card Taken Down by Hackers. Mashable. Retrieved from: http://mashable.com/2011/06/28/mastercard-down/
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now