Narrowing The Topic Of Your Essay Is An Important Stage Of Writing. Why?
Saturday, November 2, 2019
Cost-Benefit Analysis Assignment Example | Topics and Well Written Essays - 250 words - 2
Cost-Benefit Analysis - Assignment Example The company should limit access to sensitive information and, as a result, prevent any leakage (Gantz & Philpott 4). Another threat is software attacks. The company may produce software that is vulnerable to certain software. People may decide to purchase alternative software if the problem persists. Trojans, worms and viruses that significantly affect the working of the software, may attack the software. Operating system update is instrumental in dealing with malicious software. Hardware encompasses the threat of theft. The theft of the hardware may be through employees or strangers who visit the various companies. The theft can occur during civil disturbances where there is no guarantee of security. Hardware can also be damaged when in transit or at the shops. Checkpoints and increased surveillance of premises are necessary where any suspicious activity is not instantly and dealt with immediately (Gantz & Philpott 4). The assumptions on asset value were based on their current values in the market, value to competitors, the replacement of an asset if lost and any compromising issues arising from external forces. The effects of liabilities in case of a compromised asset were put into consideration. I had to make the assumptions because hard data is not easily available though one could quantify the assets efficiently based on the expensive technological products. The frequency of the threats would be a challenge though in the technical business companies deal with similar products and therefore software violations can occur. The challenges were many as the determination of the many controls in the market and their differing prices. The choice of an effective control like setting up firewall was challenging since most of the products offer similar services but have different prices. The choice of an effective control like setting up a
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.