Application of Risk Management Techniques Essay Sample

1. Menaces and Vulnerabilities
a. Windows Vista
B. Two big production installations connected to central offices via external ISP
c. Gross saless connects with VPN thru their ain cyberspace

2. Risk direction techniques
a. Mitigation – modify the proficient environment and develop the employees
b. Avoidance – extinguishing the beginning of the hazard and extinguishing the exposure of assets to the hazard
c. Avoidance – extinguishing the beginning of the hazard and extinguishing the exposure of assets to the hazard

3. Windows Vista is outdated. This company needs to update all their machines to Windows 7 or 8. There aren’t any updates coming for Windows Vista any longer therefore they are seting their company at hazard everyday that they keep Vista. Besides. it’s stated that the workstations connect via industry criterion managed switches. This may non be a high hazard but it is still a hazard. The distant production installations are connected to central offices via routers T-1 ( 1. 54 mbps telecomm circuit ) LAN connexions provided by an external ISP and portion an cyberspace connexion through a firewall at central offices. They do hold firewalls in topographic point ; nevertheless there are still menaces in topographic point. Anyone could transgress this firewall and utilize their system since it’s an external ISP. Individual gross revenues forces connect to the system utilizing a VPN which is great nevertheless they have to link utilizing their ain single cyberspace connexion typically in a place office. This puts them and the company at hazard because once more anyone could transgress this cyberspace connexion. There needs to be multiple beds of security and firewalls protecting the information.

ALSO READ  Person Centred Essay Sample

4. To forestall hazard or menaces of any sort you must safeguard all information stored on the database waiter. Employees have private information sing concern and clients stored on the database waiter and the loss or inadvertent leak of informations could be a major hit to the company. This is why it is so of import to utilize the hazard direction techniques of turning away. transportation. and extenuation. In this certain instance with the information that has been provided I believe that turning away and extenuation are the most of import of the hazard direction techniques. The company could modify the proficient environment and develop the employees. Besides by extinguishing the beginning of the hazard and extinguishing the exposure of assets to the hazard is another manner to cut down the impact of the hazard.