Question

In: Computer Science

1. What is the function of risk assessment? How is it conducted for information systems?. 2....

1. What is the function of risk assessment? How is it conducted for information systems?.

2. Why are computer systems so vulnerable? Describe the most common threats against contemporary information systems.

Solutions

Expert Solution

Answer1:

Risk assessment has several functions, as :

1. Identifying Risks of different types in the system so that it can be dealt with the logic.

2. Analyzing Risks of the same kind, it helps inefficiency because rectifying the risks of the same type helps in reducing the level of complexity

3. Judge the Risks based on their level of damage in the system

4. Collection of information, here the information means the risks of different types and the level of damage they could do in the order.

  • Risk Assessment is conducted for information systems; the purpose of it is to keep away the threats and attacks away from the system.
  • The first collection of data related to risks
  • Then the threats are identified based on many parameters like type of attack: Cross-Site Scripting Attack, SQL injection, and so on.
  • Then the evaluation of the risks based on many professional tools.

Answer 2:

Well, there are many reasons for systems being so vulnerable. First of all, it is partially depends on the user's education about systems and networks. He/She can be fooled on Phishing attacks or downloading some malware. Plus, security is expensive nowadays, and it is hard for frequent users to look at it.

Common threats against contemporary information systems

  • Risks can be on both sides: Server and Client or it could be across the medium of communication
  • Threats in servers may include the SQL injection and extract the sensitive information
  • Manipulation of data
  • Malware like keylogging or RAT which may be installed remotely

Related Solutions

1. What is the risk registry 2. what is a risk assessment 3. what are the...
1. What is the risk registry 2. what is a risk assessment 3. what are the steps for risk assessment
Make a Project of Management Risk Assessment: 1. Make a Qualitative Risk assessment 2. Make Quantitative...
Make a Project of Management Risk Assessment: 1. Make a Qualitative Risk assessment 2. Make Quantitative Risk Assessment and Mitigation
1. Risk assessment and screening procedure of:Prostate 2. Relevant information of Prostate cancer based on: a....
1. Risk assessment and screening procedure of:Prostate 2. Relevant information of Prostate cancer based on: a. Chief complaints b. Functional patterns c. Physical examination of patient with Prostate cancer 3. Pathophysiologic mechanics of prostate cancer is it a Solid tumor or Liquid tumors
Cellular Aberration 1. Risk assessment and screening procedure of Prostate 2. Relevant information based on: a....
Cellular Aberration 1. Risk assessment and screening procedure of Prostate 2. Relevant information based on: a. Chief complaints b. Functional patterns c. Physical examination of patient cellular aberrations 3. Pathophysiologic mechanics of Cellular aberration a. Solid tumors b. Liquid tumors
Healthcare Information Systems 1. Explain the required quality assessment activities in healthcare 2. Describe the principal...
Healthcare Information Systems 1. Explain the required quality assessment activities in healthcare 2. Describe the principal standards used for the digitization and exchange of patient records 3. Evaluate the concept of health information exchange, especially in terms of Meaningful Use.
Regarding Risk Assessment Security is imperative in payroll systems. Payroll information security is about more than...
Regarding Risk Assessment Security is imperative in payroll systems. Payroll information security is about more than computer security. It covers a wide range of security measures like protecting the data or information from theft, misuse, natural disasters, social attacks, or hacking. How can we advance the security in payroll transactions? PLEASE MAKE COPY PASTE AVAILABLE
What are the stages of preliminary risk assessment? What information should be included in a misuse...
What are the stages of preliminary risk assessment? What information should be included in a misuse case? Suggest two possible vulnerabilities when login/password authentication is used?
REGARDING RISK ASSESSMENT What are the different types of disclosure or brokerage of information? What is...
REGARDING RISK ASSESSMENT What are the different types of disclosure or brokerage of information? What is the probability of disclosure/brokerage of information (in terms of high, medium, low)? What is the potential impact of disclosure/brokerage (in terms of high, medium, low)? Explain. Determine the risk scale of disclosure/brokerage of information. PLEASE MAKE COPY PASTE AVAILABLE MUST BE 250 WORDS
Explain how risk factor information systems complement vital statistics systems and primary scientific research. What has...
Explain how risk factor information systems complement vital statistics systems and primary scientific research. What has driven the need for risk factor information systems in this century?
REGARDING RISK ASSESSMENT What’s the recommendation by the risk assessment team? What are the final decisions...
REGARDING RISK ASSESSMENT What’s the recommendation by the risk assessment team? What are the final decisions made by HGA management? Justify their decisions based on cost benefit analysis. PLEASE MAKE COPY PASTE AVAILABLE MUST BE 250 WORDS
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT