Thursday, February 20, 2020

Develop a partial risk and mitigation plan Assignment

Develop a partial risk and mitigation plan - Assignment Example These are the malicious programs that are spread via the internet which damage stored information in the computers. High Attack by the malicious programs would lead to loss of information that is stored in the computers which results into a significant loss for the company. The first impact would be loss of documents while the latest would be total crushing of the ICT system. 2 Hacking The ICT students may hack the schools’ accounts, which would lead to loss of information and money. Medium If this happens, the school may lose a lot in terms of cash. This is because hackers can even clear the school fees for students with fees balances First impact may be unsustainable college due to the big losses accrued. The latest impact would be total declaration of bankruptcy of the college. Malicious programs As shown in the table, the risk associated to malicious programs is very likely to occur. Malware such as viruses, bugs and other destructive programs find their way into computers and other memory storage devices. Viruses and worms have been declared a big threat to businesses’ and institutions’ security (Brittson, Oshea & Reyes, 2011.) The last survey that was done for the 1000 fortune companies indicated that cyber crime is the most dangerous crime in businesses and institutions and that can drive an organization into a lot of losses. These disastrous programs have a very high probability of occurrence in the learning institutions. Most of the Universities today do everything online. Establishment of an ICT center would enable students to carry all the assignments and other applications through the internet especially when there is a configuration of WIFI. Since most of the students are in need of the computer facilities, they would be regular in the ICT centers to carry out their research. It is through interaction of students with computers that the ICT laboratories are exposed to the risks. This results from the various memory storage devi ces that the students insert into the computers for instance the flash disks, memory cards, diskettes, external hard drives and hard disks. These storage facilities if infected would lead to infection of the computers in the ICT laboratories. The other way through which the computers could be affected by viruses and worms, is through the downloading of non-genuine files, music, or movies from the internet. If the downloaded document of music is from untrustworthy provider it may be malicious to the stored information in the computers in the ICT center (Clough, 2010). According to Martin & Schell (2004), malware attack is always associated with the loss of information from the computers. This has been witnessed in many businesses and institutions especially in the cases of viruses and worms attack and also the hackers. For instance the attack known as Aurora which happened recently destructed a lot of information in many companies. In this attack, the hackers used techniques that emp loyed a combination of stealth programming and encrypted techniques. Through the use of this technology, the attackers traced the source codes for Adobe, Google and many

Tuesday, February 4, 2020

Groupware Essay Example | Topics and Well Written Essays - 750 words

Groupware - Essay Example Today, it is undeniable that technological innovation brings the convenience of many previous laborious works. It is also responsible for the massive growth and fast traffic of the flow of information.Collaborative Software also known as Groupware is a computer supported cooperative work (CSCW). This study will nullify the downbeat notion towards the groupware that it is more of trouble than worthy to the organizational functions.According to Tom Blinck along with fellow authors in their online work Introduction to Groupware (1998), said that one of the major problems of this software is the complexity of the technologies needed that will be compatible for its function. However, hardware technologies are never seizing in development in order to comply with the best means suited for the need of the particular task.Another serious issue that Blinck and his company have been citing is the affordability of the available groupware for the company. It is undeniable the high price amount of the software, including the budget for the consultant of the software, and the trainings for the utilization. Blinck quoted Larson, stating that:"Economic recessions and restrictions of small to medium sized businesses produce decreasing budgets and therefore many firms perceive that they cannot afford to invest in GroupWare. This leads to a lack of support from top-level management. Usually the cost of implementation, hiring a consultant and training programs all add up to significant sums of money, that most firms do not see as a wise investment" Blinck and his party have been probably just looking at the financial security of the company so as not advising to invest in groupware. But they failed to see the potentiality of reimbursement of the expenses for the groupware package, or even beyond the expected price of reimbursement, due to its convenience of the function and production of the result a company could benefit of using groupware. The worthiness of groupware in financial aspect is the solutions it could give to the company and to its very user. The various components or collaboration tools of groupware surely make the various jobs in an organization a lot easier, and that is already worth of the investment (Lank, 2005). Components of collaboration tools such as electronic communication tools (synchronous conferencing, Web publishing), Electronic conferencing tools (electronic meeting system, application sharing), and Collaborative management tools (electronic calendars, workflow system) are the features of the groupware that could be very useful at the same time do not limiting the mobility of the employees within the workforce (Fjeld et al., 2002). Some of these features are common to the labels such as Lotus notes and Microsoft Exchange (Search Domino.Com, 2005). Another advantage of groupware is the wide scopes of areas of concern it can encompass as it understand the many tasks it needed to support in a company. The traditional interface only focuses on one person usability alone (Nielsen, 2008). Groupware is designed for the ease of the consumer and to assist regarding the productivity of the work in terms of quality and quantity that could be limited in the conventional interface of outdated systems. Some groupware even vary its design as the creators are considering along the size of the company, and the distinctive roles of the users playing in a team (Nielsen, 2008). Mobility is also a big factor to consider for a working company. Its limitation can hinder the production and the continuum