- 15 Marks
Question
For an organisation dealing with confidential and commercial information, security and control over its systems is very critical.
You are required to:
i. Enumerate SIX examples of such security risks. (6 Marks)
ii. State FOUR likely business impacts of security violations. (4 Marks)
iii. List FIVE ways/methods through which security risks can be managed. (5 Marks)
Answer
i. Examples of Security Risks:
- Hacking: Unauthorized access to the system to manipulate or steal data.
- Phishing: Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
- Malware: Malicious software designed to disrupt, damage, or gain unauthorized access to a system.
- Denial of Service (DoS) Attacks: Overloading a system with requests, causing it to become unavailable.
- Insider Threats: Employees or other internal personnel misusing their access to the system for malicious purposes.
- Data Breach: Unauthorized access to confidential information, leading to exposure or theft of data.
ii. Business Impacts of Security Violations:
- Financial Losses: Security breaches can result in direct financial loss through theft or damage to assets.
- Reputational Damage: Breaches can lead to loss of trust from customers and stakeholders, damaging the company’s reputation.
- Legal Consequences: Organizations may face lawsuits and penalties for failing to protect sensitive data.
- Operational Disruption: Security incidents may interrupt normal business operations, causing delays and loss of productivity.
iii. Ways to Manage Security Risks:
- Regular Security Audits: Conducting regular checks to identify vulnerabilities and ensure systems are secure.
- Firewalls: Installing firewalls to monitor and control incoming and outgoing network traffic.
- Employee Training: Educating employees on security best practices and the importance of protecting company data.
- Encryption: Encrypting sensitive data to ensure that it is unreadable to unauthorized users.
- Access Controls: Limiting access to systems and data based on employee roles and responsibilities.
- Tags: Business Impact, IT Security, Security Risks
- Level: Level 1
- Topic: Information Systems Development and Security
- Series: NOV 2022
- Uploader: Theophilus