Preview

Risk Assessment

Satisfactory Essays
Open Document
Open Document
362 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk Assessment
MERCER PAINTS RISK ASSESSMENT
VULNERABLITES
Mercer paints computer system has a few vulnerabilities. The first vulnerability is threat by hackers, which data can be stolen, corrupted, or destroyed by these individuals. User errors are next highest exposure that deal with operation of automated systems requires specializes to do update to programs, which in turn makes it easy to make errors within the programs. If the program is not properly protected, it can be easy for someone to make unauthorized changes to these programs. Virus attacks are next on the list. Virus attacks can slow down your computer almost to a stop, delete important files, or even corrupt operation files, so the computer does not function correctly and will make ever more errors within file or database. Data loss can be lost if the file system is not organization data correctly too. Data are store electronically where they are not instantly easily to find, and if you have power outage or system, failure occurs while work you could have loss data. The last highest treat on list is power failure that can occur, and you could probably lose all you recordkeepering system.

Recommendations

Mercer paints should impliment software controls, hardware controls, computer operations controls, data security controls, system implementation controls, administrative controls and antivirus software with a firewall.
Software controls will monitor the use of software, prevent unauthorized into the programs. Hardware control ensures computer physical security from fires or individuals from stealing them. Computer operations controls will ensure the programmed procedures are consistently and correctly applied to the storage and processing of processing jobs back- up files and recovery procedures. Data security controls will stop unauthorized changes, destruction and access to files. System implementation controls makes sure it's properly managed, and administrative controls will implement formalized

You May Also Find These Documents Helpful

  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    4. When a computer is physically connected to a network port, manual procedures and/or an automated method must exist to perform what type of security functions at the Network Port and Data Switch level for access control? Name and define at least three.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your…

    • 717 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Risk Assessment Paper

    • 907 Words
    • 3 Pages

    Leukemia is the malignant disorder of white blood cells in which the cells become abnormal and divide without control or order. Hematopoietic stem cells, also known as hemacytoblasts, are found in bone marrow and are the precursor to erythrocytes (red blood cells), leukocytes (white blood cells) and thrombocytes (platelets). Leukemia is caused by the mutation of the bone marrow pluripotent or most primitive hematopoietic stem cells (Caldwell, 2007). The mutations during hematopoiesis causes uncontrolled proliferation of stem cells resulting in overcrowding of bone marrow and decreased production and function of normal hematopoietic cells (Huether, 2012). The leukemic stem cells will then enter the blood stream affecting other organs such as the liver, spleen, lymphnodes, and under certain circumstances the central nervous system. The mutant clone may demonstrate unique morphologic, cytogenic, and immunophenotypic features that can be used to classify the particular type of leukemia (Caldwell, 2007). Leukemia can be fatal if left untreated because of the inhibited ability to produce and provide normal red blood cells, white blood cells, and plates to maintain homeostatic mechanisms.…

    • 907 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Risk Scenario

    • 4258 Words
    • 18 Pages

    The issue of risk scenario carries immense importance for most of the hospitals that are part of the healthcare setting. However, there is not only one scenario that can affect the hospitals but there are several scenarios that can create an impact on the functions of the hospital. There are three scenarios that would be highlighted in the current topic. These three scenarios have a tendency to put a hospital at risk for financial stability. The first scenario that can produce a negative impact on the hospital risk is related to patient care and safety. The second scenario is related to the physical plant. The third and last scenario is related to staffing. The role of HIM practitioner in this regard would be very important. They would serve as a clinical quality assessment resource and as a team member to perform their tasks related to healthcare work. Therefore, all the issues related to three scenarios will be discussed in detail.…

    • 4258 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    I have used risk assessment tools through my previous jobs in order to better understand psycho-social components of children and youngsters at risk in contact with the law (crisis, trauma, emotional and behaviour difficulties). The analysis usually requires the identification of risk and protective factors for the hearing process for the child/youngsters and preparation for pre-trial tasks. Furthermore, completing child and parental strengths and needs assessments were usually implemented, to identify child and parent relationship and functioning.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    The Integrated Distributors Incorporated is a publically traded company that is facing many challenges. The company’s Information technology infrastructure has been ignored and many of its operating locations are running outdated hardware and software, which greatly increases the risk to the network in relations to confidentiality, integrity, and availability. Because of the outdated hardware and software, the company suffered some network compromises through their JV internet site and it led to disclosures of sensitive and strategic information.…

    • 622 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Risk Management

    • 607 Words
    • 3 Pages

    The candidate does not develop a social responsibility strategy for the chosen client that includes an environmental considerations and recommendations component.…

    • 607 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assessing Risk

    • 781 Words
    • 4 Pages

    MY NAME What is it I want to do What are the benefits to me in doing this? What might go wrong? What might happen if I don’t do this? DATE…

    • 781 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    • To be aware of the signs and symptoms which indicate the possibility of abuse and to be aware of the current procedure for reporting concerns.…

    • 586 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Photo from: http://www.google.com/patents/US20120010175 2 Health Hazards: Adults (NPIC) Excessive perspiration Pupil constriction Increased tear production Increased salivation Abdominal Cramping Diarrhea Nausea Vomiting Tightness of the chest Difficulty Breathing Muscle Weakness, cramping, twitching, spasms Ataxia Paralysis Rapid/Decreased heart rate Headache Confusion Insomnia Decreased respiration rates Convulsions…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    3.4 summarise the types of risks that may be involved in assessment in own area of responsibility.…

    • 868 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Ajax Bhd

    • 1442 Words
    • 6 Pages

    Other than that, the responsibility for custody and control of magnetic tapes and system documentation randomly rotated among computer operators would be another weakness for internal controls. Random rotation among computer operators could obstruct physical controls, access security controls and monitoring as each computer operator could obtain opportunity to control those documentation. Therefore, it would be potentially result in loss of data and information through theft or unauthorized used, fire and water damage, electrical problems and sabotage.…

    • 1442 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Case Study on Risk Analysis

    • 3460 Words
    • 14 Pages

    A Case Study in Successful Risk-Based Testing at CA Introduction This article presents a case study of a risk-based testing pilot project at CA, the world 's leading independent IT management software company. The development team chosen for this pilot is responsible for a widely-used mainframe software product called CA SYSVIEW® Performance Management, an intuitive tool for proactive management and real-time monitoring of z/OS environments. By analyzing a vast array of performance metrics, CA SYSVIEW can help organizations identify and resolve problems quickly. Companies are highly dependent on the reliability of their mainframe systems. If the mainframe doesn’t run, the company stops. Mainframe workloads also are growing considerably as companies’ businesses grow and as they continually seek to leverage data and applications in new ways. At the same time, these companies are losing their experienced mainframe workforce, largely to retirement. This makes the quality of their mainframe management tools even more important to them. CA piloted risk-based testing as part of our larger effort to ensure the quality of the solutions we deliver. The pilot consisted of six main activities: • • • • • • Training key stakeholders on risk-based testing Holding a quality risk analysis session Analyzing and refining the quality risk analysis Aligning the testing with the quality risks Guiding the testing based on risks Assessing benefits and lessons…

    • 3460 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    What regression relationships would be of interest, which of these do you think you would be able to accomplish (given the data environment that you have imagined in (i))?…

    • 403 Words
    • 2 Pages
    Satisfactory Essays