blog




  • Essay / Information Security Risk Assessment for a Distribution Company...

    Information Security Risk Assessment for a Distribution CompanyTable of Contents1. Executive summary2. Introduction3. Context4. Risk assessment4.1. Organizational assets4.2. Organizational risk assessment4.3. Current organizational security posture4.4. Problems with GDI4.5. Recommended mitigation strategy5. Conclusion6. References1. SummaryCurrently, measures available to ensure information security include organizational controls such as limiting access to data, firewalls, antivirus systems, encryption, and application controls. When company security fails and individuals' private information is compromised, the company faces many legal actions that can ruin the success of the organization. One way businesses use information security that I find very useful is encryption (Rainer & Turban, 2009). Encryption ensures that information is protected, which is very important to me. Even if a cybercriminal manages to penetrate a company's network and collect information, it will be encrypted and difficult to use to their advantage. These days, I also think antivirus systems are essential. The threat of viruses is everywhere and with more than one person working for a company; the network is under a huge threat of viruses which would leave the company vulnerable to hackers and the unethical act of not protecting personal information.2. IntroductionThe information security risk assessment will provide Global Distribution, Inc. (GDI) with the guiding information needed to understand current information security vulnerabilities. As information technology continues...... middle of paper ....... Additionally, data transmission must involve encryption and decryption, with all transmissions tracked. With this mitigation strategy, the company can reduce costs and use internal IT to ensure that all information is protected using superior methods and based on business needs and not simple third-party options for declare security.ReferencesComputer Security Case Study. (nd). Global Distribution, Inc. Excerpt from educational materials. Merkow, M. and Breithaupt, J. (2006) Information security: principles and practices. Upper Saddle River, NJ: Pearson/Prentice Hall Palmer, M. (2003). Guide to operating system security. New York: New York. McGraw Hill. Shinn, L. (2008). Slouching? Measure your security posture. Retrieved from http://technology.inc.com/2008/05/01/slouching-measure-your-security-posture/