CODE GALORE CASELET
1. What are some of the emerging IT security technologies that should be considered in solving the Problem related to the case?
Ans. The Problem areas in this case are:
1 The employees from the newly acquired company Skyhaven can have access to sensitive data of Code Galore because both servers have vulnerabilities that could allow an attacker to gain unauthorised remote privileged access it can be solved by using biometric security or face recognition methods as access methods that would make the data highly secure but since the company has cash crunch they can opt for access rights and permissions to the required users.
2 The source code from Skyhaven that is to be merged with the one from Codegalore is
…show more content…
3. Change leads to risk, and some significant changes have occurred. Which of these changes lead to the greatest risk?
Ans. The areas of greatest risk are :
1 Data Security: Since the companies have merged this is of prime importance as who gets to access what.
2 Confidentiality of data: The employees of Skyhaven may have access to the confidential data of code galore.
4 . Imagine that three of the greatest risk events presented themselves in worst-case scenarios. What would be some of these worst-case scenarios?
Ans. The worst case scenarios would be:
1 The computers of code galore which are connected to those of Skyhaven become attacked by malicious software and viruses, that would really jeopardize the business.
2 Since the security is weak it can cause problems if the sensitive data is leaked out of the company in any way.
5. How can the CSO in this scenario most effectively communicate newly and previously identified risk events that have grown because of the changes to senior management?
Ans. The CSO can document what are the risks involved in both the cases .He should also document his suggestion s for the mitigation of new risks. He should arrange meetings with the senior management and highlight the areas which need a prompt response before they go out of hand and lead to further losses for the company. The areas of data security and access rights have to addressed
Due to the nature of its business, the company looks for technological risks generated by one or more of the following factors:
With these risks highlighted then reduction of risk, both positive and negative can be identified.
3) In terms of customer centricity, are any functions likely to be impacted more than others by this reorganization?
4. Identify the initial categories of risk (RBS Level 1 and 2) that you see as being present in the case study using the Example Risk Checklist (Figure A-2, Hillson & Simon text).
Moreover, now days using information system is not as walking as in the park, it has many new security treats that the company might lose their confidential data, financial and personal information.
Most organizations with company data files must predict that it is possible that someone would possibly hack into their files and cause a potential data breach.
.The advantage of being the first mover gives the opportunity to gain control. Which could bring great success and also the risk to fail. Both companies had the first mover advantage over other companies, Both were capable of expanding their busniness and achiving customer satisfaction. Not with the same level of achievement but both are still standing firm.
C. Preview of Main Points: In doing so, I will talk to you about 1) reducing your risk, 2) early detection, 3) How to act quickly.
3. What is (are) the critical path(s) in the project? What is the level of risk in completing tasks on the critical path(s)? Explain.
The board of director. The board of director should discuss enterprise risk management with management and t oversight the implementation. They need to ensure that most of significant risks have been
When it comes to the impact of each risk, it is useful to note that AUSTRAC outlines the possibilities as follows:
b. A house may be severely damaged in a fire. c. A family head may be totally disabled in a plant explosion. d. An investor purchases 100 shares of Microsoft stock. e. A river that periodically overflows may cause substantial property damage to thousands of homes in the floodplain. f. Home buyers may be faced with higher mortgage payments if the Federal Reserve raises interest rates at its next meeting. g. A worker on vacation plays the slot machines in a casino.
Almost all kind of large and small organizations might face increasing number of attacks into their network or intellectual property. This may lead to data disclosure, data destruction, and damage of organization’s reputation. There are numerous threats in the cyber space which might be capable of stealing, destroying or making use of out sensitive data for financial and non-financial gains. As the amount of computer, mobile and internet users increases, so does the number of exploiters.