Risk And Vulnerability Analysis Research Paper

PAGES
3
WORDS
692
Cite
Related Topics:

Threat Identification The threats

How the threats are detected

Ever since the September 11, 2001 terrorist attacks, businesses have had to critically rethink on the level of adequacy of their disaster recovery arrangements in relation to their business continuity plans as noted by Lam (2002,p.19). The September 11, 2001 tragedy effectively highlighted the importance for organizations to continue with their commercial operations even under the most exceptional of circumstance. My business which has a considerable e-commerce operation is particularly vulnerable to the IT related threats. It is therefore crucial that these threats be identified and eliminated or mitigated before they result to loss of revenue.

In my business, I face several threats. However, the ones that I consider most dominant are technology threats and information threats. These threats can cause a major disruption to the to business continuity planning (BCP) cycle. Technology threats include natural disasters like fire and flooding, system failure, network failure, virus attack as well as network and system flooding (Distributed denial of service attack-DDoS attack ). Information threats on the other hand include...

...

These are factors which can lead to information loss, unauthorized access as well as alteration of information.
In our organization, a worse case scenario analysis indicates that system failure and information hacking are the most common threats that can effectively cripple the operation of the organization.

The threats

Business threat 1: System failure

This is a threat to business continuity that affects technology as a resource.

Failure scenario1: Failure affecting some servers with a repair time of between 1 to 2 days.

The business continuity strategy to avert such a system failure

In order to ensure that operations continue in our organization, there is a need for a third party maintenance and support agreement to be signed with a reliable company. There is also a need to have an emergency third-party support agreement that involves an on-site response within the shortest time possible. There is also a need for our business to have redundant servers on standby.

Failure Scenario 2: Failure affecting all serves with a repair time of…

Sources Used in Documents:

References

Lam, W (2002).Ensuring Business Continuity. IT Pro. Available online at http://paul-hadrien.info/backup/LSE/IS%20490/Ensuring%20Business%20continuity.pdf Accessed on 3/5/2012

Snedaker, S (2007). The Best Damn IT Security Management Book Period. Syngress


Cite this Document:

"Risk And Vulnerability Analysis" (2012, May 07) Retrieved April 16, 2024, from
https://www.paperdue.com/essay/risk-and-vulnerability-analysis-57207

"Risk And Vulnerability Analysis" 07 May 2012. Web.16 April. 2024. <
https://www.paperdue.com/essay/risk-and-vulnerability-analysis-57207>

"Risk And Vulnerability Analysis", 07 May 2012, Accessed.16 April. 2024,
https://www.paperdue.com/essay/risk-and-vulnerability-analysis-57207

Related Documents

Risk Management Risk and vulnerability analysis Risk can be defined as a prediction of future events and their outcomes and consequences. Initially, as these predictions are being made, there is no guarantee that these event will actually occur. At this point, it becomes vital to apply probabilities in order to determine the likelihood of the event occurring. Risk analysis, therefore, is a process of describing risks involved in any situation or organization.

This means that you must train employees how to identify various forms of phishing. At the same time, you must implement some kind of security procedures that will place a restriction, on how personal information is distributed. For example, employees could be trained in spotting various kinds of fictitious emails. However, when they run across an email like that is requesting information, there would be a procedure where the

Social Vulnerability Analysis Compare and contrast your findings based on your research and provide a summary. Describe the correlation between environmental and socioeconomic risk and vulnerability for the counties you selected. This is Part III of the Social Risks and Vulnerabilities Project. St. Lawrence County, New York State and Missoula County, Montana were chosen from the Hazard Vulnerability and Risk Institute web site because they have similar population size but are from

Social Risk and Vulnerability Analysis Comment by Babyliza: There's No Abstract Vulnerability to hazards is affected by several factors, comprising age or income, the power of social networks, and neighborhood individualities. Social vulnerability takes into account the socioeconomic and demographic factors that influence the resilience of populations. The Sovi for Bexar County is 0.230416 whereas that for Philadelphia County is 3.418284. This indicates that Philadelphia County as a geographical expanse has

Risks of Climate Change THE RISK OF CLIMATE CHANGE: IMPLICATIONS FOR ARCHITECTS AND ENGINEERS Climate Change Impacts on Engineering Infrastructure Key Impacts on Water and Resources Risk Management Analysis Coping Methods Possibility And Probability Theories Recommendations And Guidelines For The Vulnerability Of Climate Change Impacts Using Risk Management Methods And Analysis THE RISK OF CLIMATE CHANGE: IMPLICATIONS FOR ARCHITECTS AND ENGINEERS This work examines climate change in relation to impacts upon infrastructure, utilities, and water in relation to the

Risk Assessment Report
PAGES 17 WORDS 4539

Risk Assessment at the Wal-Mart Stores Inc. Industry and company information Risk assessment System characterization Threat identification Vulnerability identification Control analysis Likelihood determination Impact analysis Risk determination Control recommendations Concluding remarks Bibliography (Annotated) The current economic climate is more challenging than ever and economic agents face incremental difficulties in registering profits through the serving of a population with a decreasing purchasing power. Nevertheless, in a context in which most economic agents register decreasing revenues, America's number one retailer -- Wal-Mart -- registers growing