.

Friday, May 10, 2019

Develop a partial risk and mitigation plan Assignment

Develop a partial risk and moderation plan - Assignment ExampleThese are the malicious programs that are spread via the internet which damage stored nurture in the computers. High Attack by the malicious programs would raceway to loss of information that is stored in the computers which results into a significant loss for the company. The first impact would be loss of documents while the latest would be summation crushing of the ICT system. 2 Hacking The ICT students may hack the schools accounts, which would lead to loss of information and money. Medium If this happens, the school may lose a give out in terms of cash. This is because hackers can even clear the school fees for students with fees balances freshman impact may be unsustainable college due to the big losses accrued. The latest impact would be come in declaration of bankruptcy of the college. Malicious programs As shown in the table, the risk associated to malicious programs is very likely to occur. Malware such(p renominal) as viruses, bugs and other destructive programs find their way into computers and other memory warehousing devices. Viruses and worms have been tell a big threat to businesses and institutions security (Brittson, Oshea & Reyes, 2011.) The last survey that was done for the 1000 fortune companies indicated that cyber offensive is the most dangerous crime in businesses and institutions and that can drive an organization into a lot of losses. These black programs have a very high probability of occurrence in the learning institutions. Most of the Universities right away do everything online. Establishment of an ICT center would enable students to carry all the assignments and other applications through the internet peculiarly when there is a configuration of WIFI. Since most of the students are in need of the computer facilities, they would be systematic in the ICT centers to carry out their research. It is through interaction of students with computers that the ICT la boratories are exposed to the risks. This results from the various memory storage devices that the students insert into the computers for instance the flash disks, memory cards, diskettes, external hard drives and hard disks. These storage facilities if infected would lead to infection of the computers in the ICT laboratories. The other way through which the computers could be affected by viruses and worms, is through the downloading of non-genuine files, music, or movies from the internet. If the downloaded document of music is from untrustworthy provider it may be malicious to the stored information in the computers in the ICT center (Clough, 2010). According to Martin & Schell (2004), malware attack is always associated with the loss of information from the computers. This has been witnessed in many businesses and institutions especially in the cases of viruses and worms attack and also the hackers. For instance the attack known as Aurora which happened recently destructed a lot of information in many companies. In this attack, the hackers used techniques that employed a combination of stealth computer programming and encrypted techniques. Through the use of this technology, the attackers traced the source codes for Adobe, Google and many

No comments:

Post a Comment