25 Apr 2022

386

Cyber Security Management: Associate Risks and their Management

Format: APA

Academic level: College

Paper type: Coursework

Words: 602

Pages: 2

Downloads: 0

Briefing note for the shareholders of Red Clay Renovations

The management of cyber-crime and related computer disruptions is essential in order for company business to be maintained through the application of company risk actions for cyber security linked risks.

Purpose

This briefing note represents cyber-attacks, computer system disruptions, and the associate liability in case third party equipment that has been installed by us fails in relation to the provision of adequate security for company residential clients.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Background

Red Clay Renovations is a well-known company that deals with face-lift and restoration of housing units and homes. The company majors in informing home patrons using internet technology. Even though we use internet technology, we also retain long time, correct architectural features in the course of our operations. The company deals with a risk management process that’s formal in nature. This process involves the singling out of risks, the analysis of the impact of each risk, the determination of appropriate risk actions and further, the implementation of the risk management plan grounded upon the certain risk actions (VERACODE, 2015)

Current status

According to the company’s management and the IT Security department, cyber-crime and computer system interruptions are increasing relative to the IT risk management programs within the business, and these are costing the company significantly. Cyber-crime and computer system breaks are devious criminal activities that are usually intended towards breaking corporate cyber security. Usually, the electronic breaks and disruptions are purposed to access and violation of the firm’s intellectual property rights alongside the clients’ financial information. Cyber-criminal does this in order to ensure that companies such as ours do not receive services from their websites. Further, they wage systemic viral attacks either to destabilize online corporate activity or in order to track the company’s online activities. All companies that do their businesses online have to deal with these vices in one way or another (Tarantino, 2008)

The risk of cyber-attack carries with itself an associate effect in terms of increased operational costs in form of the funds that are dedicated so as to assure cyber security. Companies that want to remain on top of business need to guard their investments from online robbery. As such, they have to incur costs with respect to identifying risks, building new and safer operating procedures, and also have to bear the cost of installing protective software and hardware. Seeing as our company has complex and sensitive operations, we need to hire a cyber-security consultant who is to develop a customized solution to our cyber security problems. More costs will be incurred in undertaking sustained testing and monitoring so as to ensure that the system is effective against computer interruptions and emerging cyber-crimes. These costs have to be shifted onto company customers in form of higher installation prices and other related services.

Cyber-crime continues to attract other devious professionals, in this case the cyber activists, into its folds. These professional hackers attack online corporate databases and operations and consequently, release sensitive information pertaining to the clientele on public fora. This may cause the company to lose clients and further, may adversely affect the company’s public image. In turn, this causes losses in terms of revenues (Juiz & Toomey, 2015).

Option

For the company to survive cyber security related risks, it needs to acquire cyber liability insurance, an asset management and protection program, configured baselines, IT configured management systems and software besides ensuring that its auditing department complies with IT security policies, plans and procedures.

Cyber-crime, computer disruptions and failure of installed equipment can impact company businesses in many ways. Companies have to device ways of collecting and storing information so that the sensitive information is not vulnerable to cyber-attack. Many companies can no longer store their own financial and their customers’ information. Their online stores are shut down, seeing as they cannot sufficiently protect themselves against cyber-crimes.

In conclusion, the company management recommends the above option in order for the company to survive any possible, future cyber-attacks.

References

Juiz, C., & Toomey, M. (2015). To govern IT or not to govern IT? Communications of the ACM, 58 (2), 58-64.

Tarantino, A. (Ed.). (2008). Governance, risk, and compliance handbook. Hoboken, NJ: John Wiley & Sons. Retrieved fromhttp://samples.sainsburysebooks.co.uk/9780470245552_sample_385600.pdf

VERACODE. (2015). A 2015 survey: Cybersecurity in the Boardroom . New York, NY: NYSE Governance Services. Retrieved from https://www.veracode.com/sites/default/files/Resources/Whitepapers/cybersecurity-in-the-boardroom-whitepaper.pdf

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Cyber Security Management: Associate Risks and their Management.
https://studybounty.com/cyber-security-management-associate-risks-and-their-management-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration