• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Threats to Organisations and Systems. Describe the countermeasures available to an organisation that will reduce the risk of damage to information.

Extracts from this document...

Introduction

Section A - Task 1 and 2 Three types of threats to organisations Loss of revenue Natural disasters are a threat which most businesses face. This can happen at the spur of the moment, anywhere and anytime. Floods, earthquakes Loss of reputation Loss of reputation is one major threat that faces every company. A good business reputation is essential if a company or organisation is to do well and become a success. If a company losses reputation this may detract people such as users and business clients. Industrial Espionage This is when another company tries to look and steal at what other companies are doing , this is also know as competitive intelligence. This is usually done by someone applying for a rival company and then using their position there to give their company information about their rivals. This information can then be used for other companies gain such as stealing ideas. Task 2 - Impact on Teign & Tow because of industrial Espionage Other companies may want to get access to Teign & Tows data for things like future products they are planning on. Since Teign & Tow create and produce their own products which some of them are patented or patent pending. If rival companies were to get a hold of data from Teign & Tow about future products they may go about to make a similar product to rival theirs, this could cause a loss in revenue for Teign & Tow Ltd. Task 2 - Impact on Teign & Tow because of loss of reputation Loss of reputation could be disastrous for a company like Teign & tow; it could mean the loss of customers and business clients which could cause their business to fail. To ensure Teign & Tow keep a good reputation within their consumers they can take extra steps to ensure their data and customer's data they keep on their systems is kept safe. ...read more.

Middle

Facial recognition machines and finger print scanners would be a great way to detect a fake employee, most obviously Teign and Tow would need to do a full security check on all current employees and all potential employees every so often to make sure nothing devious is taking place. Cryptography techniques could be used as a way of tightening up on valuable data. Section B - Implementing Security Describe the countermeasures available to an organisation that will reduce the risk of damage to information - P3 - Task 1 Teign and Tow could take up many measures in reducing the risk of damage to data. Data loss is a massive threat to this company; usually human error could be at fault of this. Backups are a fundamental step, there would need to be many backups to ensure that if the worst case scenario happens and the data is lost then the company have the choice of an external device to use, most common device would possibly be an external HDD. Special steps need to be taken out on the internet as the Teign and Tow employees would use the internet on a frequent basis, internet security would also be a top priority as the companies IP address is now out in the open etc. transmitting data over the internet is an enormous risk. Data encryption could be used as a cure for sending priceless data over the internet; this would work when one employee can send data to only one other person via encryption. Updates need to be kept up to date as this would leave the systems very vulnerable as this now would be class as an old piece of software therefore many hackers could eventually hacker into a particular program. Not only hackers but many viruses could cause havoc which leads to useful money being spent on repairing a system or purchasing a new system. ...read more.

Conclusion

shouldn't be that certain that their security software could fight off the same virus again, because this virus could have developed even robust. So this is why it is adamant that Teign and Tow purchase the high end top spec security software. Human error closely relates with data loss because the main cause of data loss is conceded by a human. Whoever has access to the data is usually the one in charge; they need to be in no doubt that the data stays out of harm's way. The hierarchy of Teign and Tow need to make sure that the data doesn't go out to anyone that shouldn't, anyone in the sense that some of the staff wouldn't be allowed the data; the receptionist for example. There is one event which cannot be stopped is a disaster. Teign and Tow need to plan a sustainable strategy to extract data and make copy, also keeping up to date with these copies. If the worst case scenario occurs then what good is a longstanding copy of the data going to do; nothing, so it is very important that whoever is in charge of updating the data completes this stage appropriately. Teign and Tow in this town would need to make sure that they keep an updated copy of their data in an alternate Teign and Tow office in another town or country all together. This way, if an earthquake was to strike an office in London and some of the data was destroyed, hopefully then there would be a backup copy in Geneva for example. Nowadays the main threats to Teign and Tow are floods, earthquakes and international terrorism. Insurance is also a big factor when it would come to paying out for damages cause by these disasters, Teign and Tow need to make sure they have the correct insurance policy in place so that if they were to make a claim, the insurance company couldn't turn around and state something out of the small print. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Organisation Security Issues

    are kept in their own keeping and control. Website content and products will need to be protected too. A lot of organisations will have to purchase many different types of license agreements for the software that they use: Concurrent: This license can be installed on multiple computer operating systems although it can only be used at one time.

  2. ICT in Organisations.

    The ones they would use are the Student record server and the Library server. Both of these servers run on a telnet server (on port 23), and this allows secure access to them from inside the campus. Domain Controllers All departments in the university have their own domain controllers.

  1. The Use of Big IP in Gamer.TV.

    do much more than just maintaining the website, if a problem occurs with the mailing part of the company, such as the weekly newsletter then these four will go and repair it, it depends on how big the job is and how long it will take and if they are already busy.

  2. Free essay

    Reduce Damage to organisations

    They can also play around with the website and remove products that are on for sale by a particular organisation or even re-price them to ridiculously high price or even lower price. This can cause a lot of problems for both organisation and customers.

  1. Building Local Area Networks

    Again, navigate through My Computer, into the Control Panel and then the Network Icon. From the network configuration window, click add, you are then presented with this screen; Select Client from the list and then click add. You are then presented with the following screen; Select Microsoft from the manufacturers

  2. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    * Allows the user to share the software's * It saves company money because with network the company only needs to buy 1 software and own multiple license. * It is easier to upgrade from 1 computer to all the rest by using the network.

  1. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, ...

    of any computer program or data, or disclosing a password, access code, or other means of gaining access to a program or data," [guardian, 2008]. Other Laws that apply to Computer Misuse are Police and Justice Act 2006, Criminal Damage Act 1971, Forgery and Counterfeiting Act 1981 and Malicious Damage Act 1861.

  2. How a particular organisation can take advantage of IT developments

    If for example a particular customer goes there to shop and finds out that they don't have the item/product that the customer is looking for or if he is a regular customer and the organisation does not have that specific item/product in stock, the organisation will lose a significant amount of customers.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work