27 Jan 2023

63

Global Finance, Inc. (GFI): Risk Assessment

Format: APA

Academic level: College

Paper type: Research Paper

Words: 4544

Pages: 15

Downloads: 0

Executive Summary 

This risk assessment follows the risky political environment that is being experienced at the Global finance company. Typically there is risk of cyber attack because some of its IT devices have fallen into the public domain. Additionally, the management fears that the there has been distrust among its customers because they view the current IT system as unreliable. customers think that their information is not securely stored. Considering that global finance company is an established company that manages finance accounts it is of paramount importance to ensure all its IT system are secure and free from any kind of breach. the company deals with financial management, loan application approval, wholesale loan processing, and investment of money management for their customers. This assessment is necessary on indentifying the risk and identifying the best measures to mitigate such risks.

Objective and purpose of the risk assessment 

The risk assessment will try to identify vulnerabilities, shortcomings and loopholes and threats on the current IT systems and infrastructure. It will be useful in evaluating the best methods that can be used to reduce the available risks and threats. It will also try to evaluate the value of the available information resources in the Global finance company.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Ideally, the total risk facing the organization will be shown by identifying the threats that the company is facing and highlighting the vulnerabilities that the company is being exposed to as a result of the available threats. The asset value will also be important in making the risk assessment successful.

The objective of this risk assessment is to show how the threats such as the ineffective system and computer hardware, the current work environment and customer dissatisfaction can impact the financial organization. The risk assessment will try to come up with the measures that the IT department can employ in reducing these risks.

Identifying the risks and threats 

Outsourcing 

Among the major risks that the organization is open an attempt to outsource tasks and responsibilities. The management indication to try and outsource the services and functions of the IT department might be putting the company at risk. The belief that outsourcing is the only solution that can be used to address the flaws that the IT department is facing might is wrong. In this regard, the CEO has been downsizing the IT resources and staff. This is a big threat to the company because it is pilling pressure on the available personnel. When a highly-experienced officer is dismissed, the impact will be felt among the remnant IT staff. If the downsizing goes on it will mean most of the IT functions and operations will go unattended (Laudon, & Laudon, 2015).

Unreliable Hardware 

The company also indicates it has unreliable and unsecure database; its oracle database server was attacked. the consequence was that the customer database lost its confidentiality, integrity and availability. Ideally this means that the company system and IT infrastructure was vulnerable. the attack can simply be termed as a cyber attack or hacking (Buecker, Andreas, & Paisley, 2008). Usually the oracle database hacking occurs in many ways. according to IT experts hacking oracle database is not much complicated. Nowadays hackers are using Script kiddies to hack into oracle databases. Typically the script Kiddie are tools comprising of scripts and codes and are used to hack into existing computer systems. Though this is a simplified way of hacking it can be used to steal, manipulate and transfer files (Wang, & Lu, 2013).

During the Global Finance Company database attack, the script kiddies might have been used to generate codes and scripts to that were utilized to gain access and manipulate data. Initially script kiddie tool had been developed as easy to use, automated software that can be used to break into oracle databases. The software used the internet to simulate cyber attacks. Considering the company deals with loan application and financial management such an attack would be risky to customer’s private information. such information might include the passwords, ATM pins, credit card numbers, financial account information and loan application information.

The oracle database attack on the global financial company is difficult to determine where it was done from. Nowadays hackers are operating from all over the globe and are hard to trace them. Hack threats and attacks are originating from within ad overseas. Major companies have been complaining of automated hacker bots from rogue programs. Experts warn that this programs and attackers are using the internet to look for organizations with easy access and therefore vulnerable (Hashizume et al, 2013).

There was also some failure in the management because the security on the computer hardware was not sufficient. The company might be termed as being vulnerable because despite handling sensitive client’s information and details, the database being used is weak to break into. Additionally, the corporate internal database is not secure in the sense that there is no use of encryption.

In addition to the oracle database attack the company’s computer system and IT infrastructure is vulnerable. The attack by malicious virus that happened to the system in 2014 is a proof of that. similar to other malicious attacks, the attack on global financial organization was extensive and affected the entire network. The oracle and email for the company was affected by the attack. these are critical elements of the company because they are used in handling customer data – including their detailed financial information. according to computer experts the attack could have been caused by viruses, spyware or malwares. a virus is an executable file or program that has the capability of self replicating and self modify and causes disruption to computers functionality and operations (Chang, & Ramachandran, 2016).

Viruses are malicious and risky in an IT system because they multiply in a network, memory or storage area. Depending on the part of computer that was harmed, the viruses cause substantial losses; for instance in the global financial scenario the virus attack affected the oracle database and the emails leading to a complete shutdown. the company suffered a $1, 700, 000 in revenue.

The viruses on computers may limit the users or owner from accessing the system. Additionally they may hinder one’s ability to use the computers efficiently. There is also indication that the viruses make the system give inaccurate output. Though it might be tricky to establish what the entry area of the virus was, there are numerous ways that the IT department could have learnt of the presence of a virus attack. The IT staff could have evaluated the speed of the computers (Burton, & Martin, 2014). Typically, the presence of viruses in computers makes them to lag in operations. The computer might also hang frequently and display inconsistent error messages.

The initial steps of mitigating a virus attack would involve purchasing and installing an antivirus. the best pro-anti viruses would protect the computer and IT system from all types of malware, spyware, hijackers, identity theft, key loggers, unwanted software, pop-ups, tracking threats and rogue anti spyware. Additional protection will include preventing the computer system form phishing, bots and worms (Fernandes et al., 2014). This upgraded antivirus will offer a firewall module protection on local network and the internet.

Using Network Typology To Assess Value Of The Infrastructure 

AssetMakeDescriptionQuantityPrice in $
Mainframe computersIBMThe mainframe computers are used to do networking In the IT department7490,000
Desktop pcdellThe desktop are used in workstations in various departments. such departments include accounting, loan, customer service, management, credit department and fiancé164166,624
Laptop/ notebooksAcerHeads of department have a laptop as a backup and to allow them remotely undertake tasks responsibilities4013,960
Mobile phonesSamsungUsed by staffs to remotely undertake their duties and tasks.16020,000
TabletSamsungThis are used in different departments to do monitoring and undertake remote operations252000
Multifunctional printerscannonEvery department has printers283,360
ScannersEpsonUsed in various departments152,985
photocopierssharpUsed in every department152,670
Network serversDell power edge and supper micro super power stationsServers available include remote access servers, SUS servers, internet web servers and oracle servers42640
External hard disksToshibaIt is used to externally store the files data and documents. it s a back up to the storage of the system4548
Generator setChampion powerServes as a power alternative11,200
Operating systemMicrosoftIt is the main operating system and through it all the other functions of the computer can be accessed505,250
softwareMostly Microsoft, and oracle and other financial applications.They provide handle computer tasks and operations in the firm1004500
AntivirusAvast and AviraThey are sued to provide security against malware, spyware and other threats.501750
Networking appliancesCiscoThey are used in providing network connectivity in the organization401600
Fire wall routerPalo alto firewallsIs used to manage traffic logs and provide security to the system.3900
WLAN controllersCiscoUsed to manage lightweight access points in large networks24000
routersCiscoThere is the border core routers and the distribution routers22000
VPN gatewayExpress VPNThese are used in connecting local area networks to the internet.3717
VLAN switchesCiscoThey does broadcast control in an organization infrastructure. they also provide network security to the IT systems.52175
PBXnextivaThis is used to provide IP connectivity to the companies telephone2720
TOTAL ASSET VALUE    724,349 

According to the table above the total asset value for the organization is $724,349. the infrastructure is a complicated one because this is an international financial organization handling large volumes of sensitive data.

The table below shows the priority value for each of the organizations assets and the how they rank in terms of need for restoration in an event of catastrophic event of an attack.

AssetPriority valueDescription
VPN gatewayVery highWhen the gateway is under or is considered vulnerable to threats the company might be under very high risk of suffering hacking. This might lead great losses. the company should move fast to mitigate any risks, threats and vulnerabilities to its gateways.
LaptopshighThreats and risks to laptops can lead to the collapse of an organization. The laptops if not secured properly can be used to access loads of information about the organizations. If the laptops fall into the wrong hands it might be exposing the company to major risks. laptops should be highly protected to avoid such threats. in case of an attack the laptops need to be given priority on examining if they were used to gain entry into the system.
Mobile phonesVery highMobile phones can also be used to as an access point into IT infrastructure. In case of an attack all mobile phones security should be reviewed and changed. There should be provision of better security like fingerprint access to avoid the mobile phones being used by hackers and attackers.
Software and Operating systemsVery highSoftware and operating systems in a computer are very important part of IT structure and its security. If the application and programs are not up to date or they are not original there might be a risk of suffering virus attack. there is high need to use original application that have been authorized and are in compliance with the law. staffs in the organizations should be prohibited from downloading unauthorized applications and software from the internet. this can lead to attacks by malicious viruses. in case of an attack, the application and software should be restored immediately to help regain access to the system. failure to do so would lead to users being denied the access to the IT system and infrastructure.
Desktop computersHighThe desks are high priority assets they should be used with care to avoid being the source of an attack. in case they are not properly secured they can be used to gain entry in to the organizations IT infrastructure. all its components should be updated by the IT officers. in case there is an attack the desktops access should be reviewed and changed. if the computer hardware is to be disposed it should be done in the safest way possible.
Fire wall routerhighThe routers also have a somehow high need to be monitored for threats. if they are impacted it may be expensive to replace them. the firewall serves to protect the other structures from destructive attack. they therefore should be restored soon in case of an event of attack.
RoutersHighRouters are an important aspect in the IT structure. a financial organization should consider investing in a good and reliable router. in case of an n attack the routers should be examined on their performance. failure to do so would result in the downfall of the system.
Network serversHighThe servers like the routers a high priority asset. They should be protected by the best measures possible. In case of an attack they will need to be restored immediately.
VLAN switchesMediumThese switches should be treated as important access points to ensure they are not used inappropriately. They should be replaced immediately after an attack.
WLAN controllersMediumThese are almost on the same rank as the switches. if they are not restored they can make utilization of the IT system to be difficult.
AntivirusHighIn case of an attack the antivirus should be among the high priority assets to look at, if the Antivirus is weak the system might be vulnerable to attack. They should be updated and used to scan through the computers frequently to prevent any attacks.
External hard disksVery HighIf external disk are attacked or are accessed by malicious people, the company may lose sensitive data and this might t not be taken well y the clients. hard disk are an important asset and should be safely stored and have only a few people accessing them.
TabletsHighTablets can be used to launch attack and spy the company they should be kept safe at all time. in case their security is breached measures should be taken to prevent an attack.
PrintersLowPrinters are not a high priority asset but they should be considered in keeping the system running
ScannersLowThey are in the same rank with the printers and are not vulnerable to attacks and risks
PBXHighIn case of an attack this is an IT component that can be targeted in tapping telephone conversation and interfering with flow of communication in an organization. it should be a high priority area to look at in case of an attack.
Network appliancesMediumThese are not high priority assets. though care should used to ensure they are not used as an entry point.
Generator setVery lowThis would rarely be affected by an attack. it would be the last thing to consider replacing in case of an attack.

Evaluating Security Perimeter 

There are loopholes in the perimeter security that makes the system vulnerable to attacks. ideally the security perimeter in IT is the preventive control devices and applications that perform the functions of deter, detecting or denying unwanted or risky access (Waichal, & Meshram, 2013).

The table below shows a list of access points both internal and external that might be making the network structure vulnerable

Access Point Vulnerability Improvement 
Computer passwordsThe company has weak computer settingsThe company should come up with better security means like providing strong sets of password
Firewall protectionThe firewall is weak and has been attacked by malware, spyware and viruses on various occasions.There should routine upgrade of the applications and firewall to avoid being vulnerable to attacks.
Wi-Fi accessThere is unregulated access of Wi-Fi by most of the employees. additionally the Wi-Fi access is supposedly open to the whole company and the nearby residentsThe Wi-Fi network should be secured with strong password set. It should not be free provided to the nearby premises and the access should be monitored though the IT department. All access should be regulated to avoid unnecessary activities.
Cloud servicesThe company has been saving most of the database in the cloud. But the cloud services are not well protected. many of the users can accessAccess to the cloud services should be monitored. All unnecessary access should be terminated an officers in charge of checking the security of the cloud service.
Website securityTheir website has loads of sensitive information belonging to the customers. this website should be highly protected to avoid risk of hackingThe website should be encrypted and utilize the latest security means to ensure hackers cannot break through it.
Database accessibilityThe oracle database can be remotely accessed by different users. There is also shared access to corporate data though the TCB access points. This makes the system vulnerable.The access should be limited and monitored. netted means to secure the data should be employed.
Data transaction in remote access connection to internal databasesThere is traversing into the database through remote access. additionally the internal database is not encrypted.There should be authentication and better configuration to avoid risks to corporate internal database. encryption would also be necessary.
Dial-up and VPN remote accessThe VPN access point is used to remotely access the company network.The password on the server should not be shared with any employee. the WEP should be of high standards to ensure better security.
Applications traversing firewall policiesConsidering the users are not effectively monitored on how they working the network and they have unlimited access, they can use any applications to undertake their duties. these applications can be used in exposing the company network to security threats.The application accessing ghee network should be monitored to avoid exposing the network. it is also good to limit the access to perimeter security by users.
Bring your own device (BYOD) opportunityUsers can bring their own mobile devices such as mobile phones and use it to access the company network, a Wi-Fi and databases. this means the devices can be used to manipulate the data and can be an avenue for attack.Most of the devices are IP enabled. Improve on perimeter security such devices should be limited and their configuration doe in a way that they won’t interfere with the network system. it is also necessary to limit and regulate the number of devices accessing the network. it is also necessary for the company to scan all external dices used to access the network.

Remote access infrastructure

Infrastructure Vulnerabilities Improvement suggestions 
Remote access seversSoftware Bugs, buffer overflows, social engineeringComing up with a better security and integrating to system with a firewall limiting social access
Smart phone and tabletsMalicious application and malwares, hacking and theft.Using better application and antivirus. using better security on the smart phones. limiting the phones that can access the network system
LaptopUnauthentic access, weak passwords and IP enabled access.Using better security and monitoring all access done through laptops.
DSL, modems and dial upUnregulated access by users,Implement a better authentication, limiting the users who can access the system,
PBXWorkload and unmonitored accessUse better authentication method, install an alert system to the PBX and its accompanying components

Best Practices Of Mobile Computing 

Mobile computing entails using smart phones, tablets, and other bring your own devices that organizations allow users to carry out responsibility with. In this company there has been a feeling the devices might be used to breach the security of the IT infrastructure.

Here are suggestions of the best mobile computing practices that the company can utilize:

Encryption: this is an effective security method that can be employed on the devices that does handle sensitive information. Any devices using the Android and Apple OS can accept encryption. Automatic encryption and decryption are recommended method to secure the devices Schmidt et al 2013).

External identification : this entails labeling the devices and would be useful in tracking lost devices back to the owner. It is effective to help find the use of the device even if the battery is dead.

Limiting data storage : the mobile phones should be limited on the amount data they can store for the company. if they are lost and they are loaded with sensitive data there can be high risks of losses. the access of data using mobile phones should also be monitored and be highly secured.

Updates: the mobile applications should be regularly updated to avoid making the system vulnerable. Hackers usually target the unsecure and the devices that are not updated. Setting automatic updates on the mobile devices would be necessary.

There should be a team of experts to help in monitoring the devices use and their security. Such a team should have representatives from different departments. Additionally the utilization and objective of using mobile computing devices should be clearly established and described. There should be an internal policy to help monitor and regulate use of mobile devices. The disposal of mobile devices with company data should be done in a safe manner.

Wireless Vulnerabilities 

According to IT expert’s wireless vulnerabilities may be present in a system but go unnoticed. Likewise the global finance organization has common wires within its environment. The company is suffering from hidden rogue APs and is making the system vulnerable. The rogue APs might be operating from nearby premises and buildings next door. The company is also suffering from blue tooth attack. Currently there are over one billion Bluetooth devices sold each year. These are devices that can be used to get access to network and cause data manipulation of theft. Devices had Bluetooth connectivity like smart phones, tablets; laptops and notebook are vulnerable to such attack. Any ad hoc or unregulated use of Bluetooth enabled device exposes the company to risks.

Some of the improvement that can be implement ted to avid this wires attacks in include regular examining of the network system to establish threat, using alert system might also be useful in identifying unwanted and malicious wireless access. The Bluetooth devices should be monitored of unwanted access and the IT department can come up with authentication mean for the Bluetooth devices.

Authentication Protocols and Methodologies 

Within the wired and wireless and other network system there seem to be shortcoming in the security. That is the reason why there has been a spike of traffic to the company’s internal networks. Additionally, the company has been having systems attack and cannot establish the place from they are originating form. Furthermore the system has reported having unmonitored access that is making the system to be vulnerable. Authentication would be an important way t achieve system security.

Authenticating would be necessary in verifying, approving or regulating connection to a third party. Some of the major authentication methods that the organization might consider using includes passwords, and protocols such as secure socket layers, IP sec, and secure shell. Password is among the most widely used authentication method. It can come as word, phrase token card or numbers that are used for identification and launching connectivity. Within the network or IT system the passwords are usually encrypted, and does not require much processing (Chapman, 2015). Password can be produced as one time password where they are made in such a way that they are not reusable. Such password can be of two types, the challenge response passwords or password lists. The challenge response passwords respond with a challenge value after receiving a user identifier. The resultant password is got through calculation or choices based on the response. The one time list password utilizes sequentially produced password tom provide access to the system.

Other authentication and protocols includes zero-knowledge proofs, digital signature and secure socket layers. The zero knowledge proof allows the host to have another host providing full access without revealing any secret information. This form of authentication requires frequent communication between the involved parties. The client will create a random but complex problem and then use the information at their disposal to solve it. Then they will send the problem and commitment to the server. Then the client will need to prove that the problems are related to the server. he will also examine the solution if it fits them they will approve it. later this will serve to provide security to the system.

The digital signature is used when users are accessing the internet and downloading files. This authentication method is used to prevent malicious or invalid information form penetrating the system. Some of the protocol that the company can use in the system includes secure socket and IP sec. secure socket provides secure communication methods for TCP connections (Wu et al 2013). The major communication alert used here is the Hello message which is used to establish connections, the protocol version, and session identifier and compression method being utilized. the IP sec uses algorithm to provide security to the network

Web System Protocols and Their Improvement 

The company has not been able to establish the information of the traffic accessing their website. There has been abnormal traffic to their site. Additionally there has been problem with network latency, slow performance and applications time out. Therefore the company needs to sure there is improved web system protocols to eliminate the vulnerabilities. A recommended way to do this would include having offline encryption systems. This system will take a message encrypt it and the store the cipher text or transmit it to another user. Some of the protocols that can help deliver on this objective include the PGP which provides encryption and digital signatures for email and electronic documents. The MIME protocol can slow be used to secure website and emails (Samociuk, Adamczyk, & Chydzinski, 2015). Other measure that the company can employ includes investing on additional bandwidth and compression. Having queuing schemes on the router would be effective in improving the web system security.

Cloud Computing 

According to research, failure to have an appropriate security protection with the cloud services can result in higher costs and possible loss of business. This might be the reason why the global finance company had attackers use virus to break to the system and this consequently led to the collapse of the oracle and email servers. The attack could have occurred through eh cloud service and this resulted in a loss of $1.7 million in revenue. Such an incidence is risky in a company because it can lead to loss of trust and some customers might leave the company (Boyd, & Mathuria, 2013).

In order to solve the cloud computing risks it is necessary to use effective authentication and authorization measures, it is also essential to be in compliance with the law. Despite the fact that cloud resources can be access from any place in the globe, user identification and access should be monitored critically to eliminate presence of hackers and intruders in the system. Strong authentication and authorization would be important in ensuring the cloud services are secure and free from threats. The company can show their commitment to legal compliance by accepting regular permit audits by the cloud customers. This might include presenting prove of compliance like certificates.

The other means to establish suitable cloud services security is by auditing the compliance of IT systems and other business processes. The company should share report of cloud providers operation with the customers to prove they are reliable and trustworthy. The company might also consider issuing the customers with self service facilities to manage and monitor usage of cloud services; the same can also be shared with auditors.

Assets and Vulnerabilities 

AssetVulnerabilityImpact of being compromised
Mainframe computersVirus attack,Loss of data, theft and manipulation of system operations
Desktop pcUnwanted access to the system and network, entry of destructive codes into the systemLoss of information, difficulty in undertaking operations
Laptop/ notebooksUnwanted access to the system and network, remote access, virus and malware attack,Loss of data and information, virus attacking and destroying system components, malfunction of computer systems and hardware
Mobile phonesUnwanted access, spying, theft and getting lost or being misplacedLos of information, manipulation of company network, spying and sensitive information might be stolen
TabletTheft, virus attack, getting lost or being misplaced 
Multifunctional printersVirus attackmalfunctioning
ScannersHardware failuremalfunctioning
photocopiersHardware failuremalfunctioning
Network serversHacking, and intrusionSlowed network, delay in operations
External hard disksTheft, virus attackLoss of sensitive information and companies documents
Generator setArson activities, hardware failureLoss of backup power, or an alternative power source
Operating systemVirus attack and spyware activities,System failure, and inaccessibility
SoftwareVirus attackSystem failure
AntivirusBeing out of dateMalware and virus attack, leads to impaired system
Fire wall routerintrusionVirus and hacking attack
WLAN controllersWireless attacks,Lock ins,
RoutersIntrusions and unwanted accessLoss of Wi-Fi connectivity
VPN gatewayWields attack ad intrusionLoss of connectivity and poor networking
VLAN switchesHardware failureSystem failure
PBXIntrusion, and spywareLoss of telephone connectivity

recommendations on mitigating threats, risk, and vulnerabilities in the IT system

AssetRecommended measures and improvements
Mainframe computersUsing good governance and better administration procedures
Desktop pcMonitoring use of the desktop PCs
Laptop/ notebooksUse encryption and strong password, monitoring the use of the laptops
Mobile phonesProvide strong password sets and encryption to avoid unfavorable access, regular scan and limiting the use of unnecessary application
TabletBetter security and limit the access by malicious persons, regular scan of the devices
Multifunctional printersAssign an expert to wok and assess the printers
ScannersAvoid operation by multiple users, scan for worn out parts
photocopiersRepair worn out parts, provide backup machines
Network serversUse fire wall protection, monitor every access, provide stronger and possibly one time passwords
External hard disksSafe storage, provide encryption security
Generator setSafe use and use of manual, regular assessment by an expert
Operating systemRegular updates
SoftwareRegular updates
AntivirusRegular updates and certifications
Fire wall routerEncryption and better password set, update firewall applications
WLAN controllersInvest in modern appliances
RoutersStop using default password,
VPN gatewayProviding latest VPN security authentication and authorization
VLAN switchesSecure socket layer encryption,
PBXProvide warning system to eliminate intrusion and hacking, eavesdropping or tapping.

References 

Boyd, C., & Mathuria, A. (2013). Protocols for authentication and key establishment. Springer Science & Business Media.

Buecker, A., Andreas, P., & Paisley, S. (2008). Understanding IT perimeter security.  IBM Corporation .

Burton, B., & Martin, B. (2014, October). The Second Generation of Teaching Mobile Computing: Practices and Pitfalls. In  E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education  (pp. 278-292). Association for the Advancement of Computing in Education (AACE).

Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the cloud computing adoption framework.  IEEE Transactions on Services Computing 9 (1), 138- 151.

Chapman, A. (2015).  Semi-Autonomous Networks: Effective Control of Networked Systems through Protocols, Design, and Modeling . Springer.

Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security issues in cloud environments: a survey.  International Journal of Information Security 13 (2), 113-170.

Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing.  Journal of Internet Services and Applications 4 (1), 5.

Laudon, K. C., & Laudon, J. P. (2015).  Management Information Systems: Managing the Digital Firm Plus MyMISLab with Pearson eText--Access Card Package . Prentice Hall Press.

Samociuk, D., Adamczyk, B., & Chydzinski, A. (2015). Impact of router security and address translation mechanisms on the transmission delay. In  Proc. 7th International Conference on Evolving Internet (INTERNET 2015)  (pp. 38-42).

Schmidt, D. C., Stal, M., Rohnert, H., & Buschmann, F. (2013).  Pattern-Oriented Software Architecture, Patterns for Concurrent and Networked Objects  (Vol. 2). John Wiley & Sons.

Waichal, S., & Meshram, B. B. (2013). Router attacks-detection and defense mechanisms.  Int. J. Sci. Technol. Res 2 , 145-149.

Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges.  Computer Networks 57 (5), 1344-1371.

Wu, Y., Cegielski, C. G., Hazen, B. T., & Hall, D. J. (2013). Cloud computing in support of supply chain information system infrastructure: understanding when to go to the cloud.  Journal of Supply Chain Management 49 (3), 25-41.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Global Finance, Inc. (GFI): Risk Assessment.
https://studybounty.com/global-finance-inc-gfi-risk-assessment-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

How AI Can Help Retailers Solve Business Problems

The global marketplace is currently more integrated than ever before. This situation presents a never-before experienced opportunity for retailers. Multinational organizations whose sole basis is the internet have...

Words: 2700

Pages: 5

Views: 138

The Natural Organizational Model and the Informal Groups

The nature of an organization is based on different factors such as the environment it is set up in. also, the type of activity it undertakes. This paper will examine the natural organizational model, the informal...

Words: 3009

Pages: 10

Views: 239

Why Pinkberry should focus on making orange and yellow the two prevailing colours

The fact that Pinkberry has evolved from a storefront to a nationally recognized brand makes this franchise of frozen dessert yogurt shops an example to be followed. Yes, the personality of a brand created a platform...

Words: 582

Pages: 2

Views: 93

Ford Motors: Board Presentation For Electric and Hybrid cars Production

Executive Summary The motor vehicle industry in America and worldwide is highly competitive with major players no longer enjoying the dominance that they had had before. Innovation and identification of trends...

Words: 1088

Pages: 4

Views: 130

Home Remodel Project Plan

Project Overview Home remodeling is one of the notable key projects undertake through project management, as a project manager is expected to come up with a clear plan that would help in meeting the expected...

Words: 2152

Pages: 8

Views: 69

How Airbnb Achieved Success

Hospitality industry includes firms that provide lodging and dining services for customers. Many of the businesses in the travel and hospitality industry offer customers with prepared meals, accommodation, snacks,...

Words: 906

Pages: 3

Views: 63

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration