preview

Nt1310 Unit 3 Risk Management Practices

Decent Essays

We have all herd of security breaches on corporate servers that has exposed personal and important information that should be secure. Hackers and criminals have been doing this since the invention of the internet and has only increased along with our use and dependency on networks. It is becoming more apparent that company’s need to protect their windows and Unix/Linux servers from known or unknown shortcomings and vulnerabilities from hackers who want to steal information for malicious purposes. Hackers will use codes or malware to corrupt network or operating system of the target company, with the intent to steal information such as proprietary information, personal information including social security numbers, contact information, or any …show more content…

This starts with five crucial risk management practices: protection, detection, prevention, reaction and documentation. Along with the risk management practices, the company should also implement good physical security measures. They include firewalls, user authentications- like strong passwords and user names, software protections like security suites, backups, Intrusion detection and automated constant system integrity …show more content…

We are able to protect our networks from risk but never in totality, despite all our best efforts we are never 100% protected. “Of the two basic problems that rely on prevention, the first is that information security risks are multifaceted in nature, which implies that a virus arriving via e-mail, for example, may not only infect the local system but could also install a backdoor for unauthorized access to the network that can be connected to the utility provider of another country. The second problem is that true prevention requires the elimination of risk (i.e., stopping its occurrence) The only way to do that is to control most, if not all, components of the event. Not an easy task. That said, practical prevention is both the implementation of lessons learned and the application of knowledge gained to avoid the same fate in the future” (Ameri). Prevention requires reassessment of your security policy, learning and revamping of protocols to adjust with potential threats to maintain a healthy

Get Access