Question

In: Finance

Risks for Information Assets (Data files, Databases, Operational and support procedures, Archives, Disaster management plans) in...

Risks for Information Assets (Data files, Databases, Operational and support procedures, Archives, Disaster management plans) in a small to medium business include Data Theft, Ransomeware and Forces of nature

Document in detail the results of a risk assessment for the three identified risks including reasons justifying it as being significant, and risk assessment factors. For each of the identified risks propose potential mitigation and control measures, and what actions would appear in a risk control strategy plan to demonstrate confidence in the effectiveness of the suggested mitigation and control measures

Solutions

Expert Solution

Documentation of Risk Assessment:

We have performed the Risk assessment for the Information Assets of a Small and Medium Enterprise , XYZ company, and the summary of the findings are detailed below:

1. Data Theft Risk:

Findings

Severity of Risk

Potential Impact and Mitiagation

Access to Accounting Databases was open to modify to “all users” without limitation of access based on level of usage, and requirement.

High

Brings in to question the reliability of accounting information, and the reports generated based on the said reports, and based on sample tests : Could result in and Adverse opinion on the Financial Statements.

Mitigation: The enterprise to immediately curtail access, and revisit user based access controls be granted , based on usage and requirement.

Physical access controls for the Server room were inadequate.

It was observed that the data room was accessible by the staff, without monitoring.

High

Potential impact could be theft, unauthorized changes.

Needs immediate management action.

Mitigation : To remain locked at all times, with only authorized IT personnel to have access to keys. Log book to be maintained on time of access , and purpose, with signature of the personal accessing.

CCTV to be installed to monitor access.

2. Ransomware Risk:

Findings

Severity of Risk

Potential Impact and Mitigation

The verification of the data storage protocol showed that there was no cloud based back-up being made.

Moderate

Though the enterprise is regularly making data back-up physically, an additional level of cloud-storage would be recommended.

Not all systems connected to the Enterprise network contained Anti-virus protection.

High

Needs to be immediately rectified since this could potentially compromise the security of the server.

Action: Install Anti virus in all systems.

3. Threat of Nature :

Findings

Severity of Risk

Potential Impact and Mitigation

Not everyone at the enterprise was aware of safety passages, to use in the untimely event of fires.

Unaware of the presence and method to use fire extinguishers.

High

Without proper training , there is a high potential for unforeseen events.

Fire drills be made mandatory, and data centres to have specified personnel to immediately put out any such risks, and continually monitor , to prevent events that cause such risk.

No Secondary location having data back-up

High

The risk of physical loss of data, could result in loss of Critical enterprise data, resulting in massive loss of resources and time in recouping the same.

The enterprise to immediately have a backup location, which would have the enterprise data updated on a daily basis in the secondary server.


Related Solutions

Explain operational risks and give two examples of such risks faced by management at financial institutions
Explain operational risks and give two examples of such risks faced by management at financial institutions
Describe the importance of databases and database management systems in managing organizational data and information. Include...
Describe the importance of databases and database management systems in managing organizational data and information. Include in your discussion the types and some examples of database management systems. Also, address the advantages and disadvantages of using a DBMS.
Compare a data warehouse used for decision support to an operational database. How do the data...
Compare a data warehouse used for decision support to an operational database. How do the data warehouse and the operational database differ in their purpose, their structure, the technology they use, and the way they are managed? Why would a company need both?
Information Produced by the Entity Example 3 – Audit procedures to address audit risks related to...
Information Produced by the Entity Example 3 – Audit procedures to address audit risks related to IPE from a transaction process Complete the following table, indicating the audit procedure that would be performed to address the identified risk. Risk 1: The IT application is not processing data correctly (incomplete or inaccurate). Information about ABC’s shipments is input manually into the IT application by the shipping clerk. The risk is that the shipping clerk mistypes the quantity shipped. Audit procedure to...
Create a risk management plan including contingency plans for the identified risks for Apple Inc.
Create a risk management plan including contingency plans for the identified risks for Apple Inc.
What do these terms mean? Numeric classification Archives Subject classification Computerised systems Keyword classification Information management...
What do these terms mean? Numeric classification Archives Subject classification Computerised systems Keyword classification Information management system Alphanumeric classification System integrity Manual systems Chronological classification
Explain the procedures you might need to follow to access the financial data and plans necessary...
Explain the procedures you might need to follow to access the financial data and plans necessary for efficient operation of a team/ section/ division. (120-150 words)
Explain the value of data and information Data and information as assets Importance of investing in...
Explain the value of data and information Data and information as assets Importance of investing in security Relationship of data to creating information Intellectual property Trademarks Copyright Patents Digital products Data-driven business decisions Data capture and collection Data correlation Meaningful reporting
Which of the following is NOT an objective of all information systems? a. support for the stewardship function of management b. support for ..
Which of the following is NOT an objective of all information systems? a. support for the stewardship function of management b. support for management decision making c. support for the day-to-day operations of the firm d. all of the above are objectives
Secondary Data Sources. What are indexes, registries, and healthcare databases? What information is collected in them...
Secondary Data Sources. What are indexes, registries, and healthcare databases? What information is collected in them and how do we or could we use them?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT