Risk Management Background Check For Essay

PAGES
2
WORDS
666
Cite

While online purchases do increase in importance and popularity, it has to be noted that customers across the globe still perceive online operations as unsafe. If the company proves their fears are entitled, it risks losing their trust and their purchases. In other words, it is absolutely necessary to resolve the problems of the system weaknesses and the risks of information leakage. In order to address the problem identified, the security team would assess the strength and capability of the data storage system. Also, it would assess the access to the data storage unit. Third, it would look at encoding controls and assess the encoding process and shortages. At a more specific level, the following actions would be recommended:

The evaluation of the data storage unit by the identification of the specific location where data is stores, as well as the specific means in which data is stored

The search for and identification of the weak spots within the data storage unit; this identification...

...

A general stand in this direction would be represented by the limitation of the access to the weak spots.
Last, the fourth and final step would be represented by the implementation of security precautions and the encoding or encrypting of sensitive data, so that even if it is leaked, the third parties do not have direct access to it.

Aside from these, it is necessary to periodically conduct tests and verifications in order to ensure that the control systems are adequate and in place and able to minimize the risk of data leakage (Gifford).

Sources Used in Documents:

References:

Gifford, N.., Information security, CCH Australia Limited

Landoll, D.J., 2006, The security risk assessment book, Taylor & Francis Group


Cite this Document:

"Risk Management Background Check For" (2011, July 08) Retrieved April 23, 2024, from
https://www.paperdue.com/essay/risk-management-background-check-for-43153

"Risk Management Background Check For" 08 July 2011. Web.23 April. 2024. <
https://www.paperdue.com/essay/risk-management-background-check-for-43153>

"Risk Management Background Check For", 08 July 2011, Accessed.23 April. 2024,
https://www.paperdue.com/essay/risk-management-background-check-for-43153

Related Documents

relationship of employee theft and organizational objectives in Capstone. It has sources. Capstone Turbine Corporation, incorporated in 1988, is an organization that designs and creates turbines. They use the latest technology to create these turbines, as they are ones that are in demand for hybrid electric vehicles. Capstone Turbine Corporation develops, manufactures and markets microturbine technology, which is used in stationary distributed power generation applications. These include combined heat and power,

Phishing Spear Phishing and Pharming The following is intended to provide a very brief overview of examples of some the most dangerous and pervasive security risks in the online and networked world. One of the most insidious of identity theft is known as phishing. The term 'phishing' refers to the practice of "fishing for information." This term was originally used to describe "phishing" for credit card numbers and other sensitive information

Risk Assessment
PAGES 12 WORDS 3324

Chief Information Security Officer-Level Risk Assessment The objective of this work in writing is to examine Chief Information Security Officer-Level Risk Assessment. Specifically, the scenario in this study is securing information for the local Emergency Management Agency in an Alabama County. The Director of Emergency Management in this County has tasked the Chief Information Security Officer with setting out a plan for information security of the Department's networking and computing systems. Information

Integrating Total Quality Environmental Management Systems - a Critical Study of TQEM Relevance of TQM to Environmental Management Scope of Dissertation Moving from Reactive to Proactive Management Understanding TQM in Relation to TQEM History of TQM Operation of TQM Quality and Environmental Management Standards Environmental Management Systems Weaknesses of EMS Standards Total Quality Environmental Management Comparing ISO 9000 and ISO 14000 Integrating the ISO 14000 Environmental Management System Demographics Impact of certification on economic and ecological performances Research Design and Nature Integrating a Sustainable EMS with

Risk Assessment SAFETY AND HEALTH RISKS: UK Workers' health and safety has become a major issue of debate in the UK corporate world because it has been found that in several cases, occupational injuries occur not due to the negligence of the employees but more because of the inappropriate safety measures. While not every person would agree with this, at least those in the legal profession maintain that employers can be charged

Management Action and Productivity Businesses in developed countries tend to think of Corporate Social Responsibility (CSR) as a characteristic that is centered in their own businesses or, failing that, situated in the industries of wealthier nations. The CSR movement is substantively skewed in the direction of the developed world where the motivation for adopting a CSR initiative is driven more by altruism -- or "enlightened self-interest" (Vogel 2006: 18) -- than