Security Risk Assessment For Ajax Essay

Length: 5 pages Sources: 3 Subject: Business Type: Essay Paper: #52418946 Related Topics: Risk Assessment, Security, Biometric Technology, T Mobile
Excerpt from Essay :



This is a separate problem from the system being hacked. Managers may also be far too unaware of the ease in which cellphone networks can be hacked (Hacker Cracks T-Mobile Network). Certainly being aware of the ways in which cellphone and other electronic systems can be hacked or infiltrated in other ways. Such technical attacks can be relatively more easily addressed. Hacking is nearly as old as computer technology itself -- and thus so are anti-hacking measures. Like the constant battle to evolve faster between antibiotics and bacteria, hackers and security specialists are in a similar battle to get ahead of each other. But such measures will not address in any way the problem outlines above of how to know who is in possession of the mobile devices at any given time.

Solutions to Ajax's organizational risks

The primary way in which to remedy the potential organizational problems outlined above is to consider the ways in which certain working conditions have habitually created the potential for workers to be disloyal to their employers as well as to the customers or clients of their employers. In short, the conditions that are inclined to push employees into acts of disloyalty include the following:

1. When workers are given to much work to accomplish within their established work hours. There are two standard types of work overload. The first is when "they have the impression that they are working under pressure and have too much work to do in too short a time. This form of overload has been much more common for the last few years as many organizations have slashed jobs" (Organizational risk factors). This risk factor may well be present for the Ajax couriers.

The second major form of overwork is "qualitative work overload." This arises "when they feel that they are unable to perform their...

...

Too little work. While this seems counterintuitive, workers can be as stressed by too little work (which is another way to describe boredom) as by too much.

Providing a work environment in which 1) Workers are reasonably compensated; 2) they are not stressed by over-work; 3) workers are not bored by being under-utilized; 4) workers are given an appropriate amount of freedom and authority; 5) workers are encouraged to feel that they have a real stake in the company through a profit-sharing or stock-option program will be one in which the organizational risks from employee actions will b e substantially minimized.

Reducing technical risk

The primary technical risk identified above is that there is no security check in the current system for who has the mobile devices. In the current system, the devices could well have been in the possession of the worker's roommate while the worker slept off a hangover -- or even in the possession of an employee of a rival company. The simplest way to reduce this technical risk is to have each mobile device incorporate a biometric security device such as a fingerprint recognition system or an iris scanning device. In this way, if each employee were required to check in at regular intervals with the biometric device, Ajax managers would be assured that the device was in the possession of the correct employee.

Of course, such a biometric system is likely to make employees feel distrusted and so might prompt them to try to bypass the system. This is a reminder of one of the most important axioms of security risk management: Organizational risks are generally the most potentially dangerous and must be addressed first and most pervasively.

References

Hacker Cracks T-Mobile Network. (2005, January 13). The Boston Globe. Retrieved from Http://www.boston.com/business/technology/articles/2005/01/13/hacker_cracks_t_mobile_network.

Kahneman, D. & Lovallo, D. Timid choices and bold forecasts: A cognitive perspective on risk taking. Management science 39(1): 17-31.

Organizational Risk Factors, retrieved 22 March 2010 from http://www.cgsst.com/eng/risk-factors/organizational-risk-factors.asp

Sources Used in Documents:

References

Hacker Cracks T-Mobile Network. (2005, January 13). The Boston Globe. Retrieved from Http://www.boston.com/business/technology/articles/2005/01/13/hacker_cracks_t_mobile_network.

Kahneman, D. & Lovallo, D. Timid choices and bold forecasts: A cognitive perspective on risk taking. Management science 39(1): 17-31.

Organizational Risk Factors, retrieved 22 March 2010 from http://www.cgsst.com/eng/risk-factors/organizational-risk-factors.asp


Cite this Document:

"Security Risk Assessment For Ajax" (2010, March 24) Retrieved July 29, 2021, from
https://www.paperdue.com/essay/security-risk-assessment-for-ajax-961

"Security Risk Assessment For Ajax" 24 March 2010. Web.29 July. 2021. <
https://www.paperdue.com/essay/security-risk-assessment-for-ajax-961>

"Security Risk Assessment For Ajax", 24 March 2010, Accessed.29 July. 2021,
https://www.paperdue.com/essay/security-risk-assessment-for-ajax-961

Related Documents
It Security Plan & Implementation
Words: 5733 Length: 16 Pages Topic: Education - Computers Paper #: 51789407

Second, the specific connection points throughout the network also need to be evaluated for their levels of existing security as well, with the WiFi network audited and tested (Loo, 2008). Third, the Virtual Private Networks (VPNS) and the selection of security protocols needs to be audited (Westcott, 2007) to evaluate the performance of IPSec vs. SSL protocols on overall network performance (Rowan, 2007). Many smaller corporations vacillate between IPSec

Cloud Computing Emerging Trends for
Words: 2873 Length: 7 Pages Topic: Education - Computers Paper #: 49093227

In addition to the stability, scalability and extensibility of its architecture, cloud platform have made it possible for workflows across government to become more pervasive and secure as a result [4]. The TCO of a given cloud platform or series of applications therefore has continued to become reduced by the experience effect (comparable to economies of scale yet only applied to data aggregated and knowledge creation) across government [6]. This

Cross Platform Mobile and Web
Words: 17284 Length: 63 Pages Topic: Education - Computers Paper #: 95555197

82). Both desktop and Web widgets have the same basic components. Fundamentally, they use Web compatible formats, even if intended to run in a desktop environment. This means that the core of the widget is HTML and CSS code which contains the actual content of the widget, namely text, linked images/video or content pulled from a server of Web service. Alternatively, the widget content can be created using Flash, although

Management Systems Appendix a Project
Words: 3329 Length: 12 Pages Topic: Education - Computers Paper #: 47337090

Another factor in open source database vendors leading this area is the focus on multiple models for scalability as can be seen in Table 1: DBMS Features Analysis. The support of multiple models of scalability also concentrates on OLTP transaction integration specifically within roles as defined in the security model (Pereira, Muppavarapu, Chung, 2006). Security will be discussed later in this analysis. The second factor used to evaluate closed source

E-Commerce Plan Nintendo's Global Leadership
Words: 2844 Length: 10 Pages Topic: Business Paper #: 14312015

S. Home Console Hardware Market Figure 4: Home Console Hardware Sales in Europe Source: Nintendo Investor Relations (2009) Clearly the Wii was able to gain an exceptionally large market share quickly after being launched. This was accomplished in the midst of a global recession as well Market Demographics and Needs For many who believe the computer gaming market is one that is composed of teenagers, their stereotypes of gamers is quite off the mark.