ABSTRACT
Computing technology has changed the way users work, learn and play-More businesses have gone online. They have turned into a vital piece of our regular presence. These computer system are vulnerable against various internal/external threats like malware in both homes business and environments and this has rapidly escalated firmly over the past several years. Information in this systems needs to be protected from intruders because it’s an essential asset in the organisation. Three basic important things need to be supplied is integrity confidentiality and availability of information. The diversity of risk to the network computing by disenchanted attacks has intensely maximised worldwide. This is according to the U.S federal bureau of investigation .The digital attacks globally have reached 20,000 in January causing more than 8 billion dollars damage (Mueller, 2003).
Risk assessment simply means looking at each specific task and considering the best way to complete it.This assists to be aware of the hazards involved in performing the task and something done to prevent injury. To assess risk, one first need to identify the hazards (that is, tools, equipment’s, materials and work method); Secondly, to decide who might be harmed and how. In addition, evaluate the risk and put measures to control the risk. Also, record the discovery and implement them and finally analyse the evaluation and update as necessary.
Keywords:-risk assessment, computing technology, malware,
Risk assessment- An assessment of any risks to the worker's health and safety is undertaken by a trained risk assessor. This allows for the risks to be removes, reduced or avoided, and for preventive and protective measures to be identifies and
The idea behind a risk assessment is to attempt to identify all the potential risks associated with a particular activity. The risk assessment will normally be carried out by the nominated Health and Safety Officer.
Risk assessments can help address dilemmas between rights and health and safety concerns by helping reduce any risks created by undergoing certain tasks, risks assessments are not in place to prevent an individual doing things that they want to do, they are in place to concentrate on the risk factors and to look at any other ways to reduce the risk of the task in hand.
4.3: To carry out a risk assessment first of all you need to identify the hazards, then decide who might be harmed and how. Then evaluate the risks and decide on precaution and then record your findings and implement on them. After this is done review your assessment and update if necessary.
Risk assessment make staff and service users aware of potential risk. This is important also to help services users to understand the risk and responsibilities of the employee and the employer The correct use of equipment to reduce the chance of injury to themselves and the service users for example, back injury. Reporting any difficulties or problems with equipment, using the right equipment and have adequate training to operate it correctly.
Risk assessment is conducted by people who can assess specific work activities, understand real working procedures, hazards-related activities, activity frequency, risk probability and severity (Reference 2).
Risk assessments are used to identify potential harm to an individual or persons. This identifies the possibility of a hazards and helps to reduce the possibility of harm, they are put in place to safeguard individuals. Risk assessments are reviewed and can be added to or changed if necessary
The world of cyber security continues to introduce new threats each year against network infrastructures and computer devices. In the recent years, the impact from cyber-attacks has wreaked havoc on many company brands and organizational reputations. As this issue grows so does the technology to prevent and protect against these malicious attacks. It is absolutely crucial for organizations and businesses to shift focus from defense for different types of attacks to improving safeguards to mitigate the loss of sensitive data when an attack occurs. In addition to the traditional security technology used to detect an attack, companies will have to include
The risk assessment is there to find out all the hazards, the risks of these possible hazards and the equal of risk related to those hazards. For example a result of this it lets the teacher to place control events in place which to reduce.
Information security enabled by technology must include the means of lowering the impact of intentional and unintentional errors entering the system and to prevent unauthorized internally or externally accessing the system actions to reduce risk data validation, pre-numbered forms, and reviews for duplications. It is crucial that the mission plan include the provision of a disaster recovery and business continuity plan. On the other hand, there is much more intrusion activity today than ever before. Obviously, there is an increased concern for attacks through companies’ network in an effort to either commit malice or affect the integrity of an organization’s most valuable resource. Therefore, it is important that companies do not get complacent in their IT infrastructure security. The fact of the matter, there is no perfect system; however, it behooves organizations to protect their information by way of reducing threats and vulnerabilities. Moreover, Whitman and Mattord (2010) said it best, “because of businesses and technology have become more fluid, the concept of computer security has been replaced by the concept of information security. Companies
Numerous association and organizations in this world, including government and military store a lot of secret data on PCs and send essential information around the world to different PCs. With programmers out there, there ought to be an extraordinary level of security to ensure these information and individual data. As indicated by senate insight authorities, Cyber attack is one of the main dangers in the country so this needs to compass consideration.
Over time the workforce has change in different areas. People tend to change jobs in their lifetime. Also, job is not what they use to be in terms of your job title. Such as a doctor; there are different types of doctors who make different amounts of money and doctor on different areas. Technology has changed the workforce, and technology is also replacing different types of work. Technology has also made people less-skilled depending on technology to get their job done. Technology has had a big impact on the workforce, because it took jobs away, but also created new jobs. An example of that would be telemarketing.
Prevalent to the current trend now is the dependency of the society on Information technology and communication systems. Every aspect of human life is one way or the other linked and controlled by information technology tools. The importance of information technology cannot be over emphasized as its unavailability could lead to a form of disaster or the other. Pivotal infrastructures like finance, healthcare, education and security are driven by information technology. However, information technology and its benefits are accompanied by vulnerabilities and risks that can be exploited by people with the necessary technical skills. Individuals like ‘Hackers’ and ‘Cyber Terrorist’ can cause disruption to information systems, commit financial fraud and also attack computers and networks. These attacks and disruptions could result to violence against people and properties. In some cases, death, serious injuries and severe economic loss could occur as a result of these attacks.
The increasing volume and sophistication of cyber security threats including targeted data theft, phishing scams and other online vulnerabilities demand that we remain vigilant about securing our systems and information.
Almost all kind of large and small organizations might face increasing number of attacks into their network or intellectual property. This may lead to data disclosure, data destruction, and damage of organization’s reputation. There are numerous threats in the cyber space which might be capable of stealing, destroying or making use of out sensitive data for financial and non-financial gains. As the amount of computer, mobile and internet users increases, so does the number of exploiters.