Assessing and Mitigating the Risks to a Hypothetical Computer System Research Paper

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

The security of information is very important for the success of any organization and therefore should be given the first priority in the organization’s strategic plans. The computer system of a Hypothetical Government Agency (HGA) faces quite a number of information security threats that need to be brought under control for the agency to operate efficiently (Newman, 2009). Some of the major threats to HGA’s computer system include accidental loss of information, virus contamination, theft, unauthorized access and natural disasters. This paper will highlight some of the Biometric solutions the agency has put in place to address computer security issues and finally assess the role of Biometric systems in an Information Technology environment.

Payroll fraud and errors is one of the major security issues that occur due to inadequate information security system (Vacca, 2009). This threat can be solved by initiating an automated payroll process that is in line with both Government and HGA’s information security policies. The time and attendance data should be concealed as much as possible to reduce chances of manipulation. The other security threat is unauthorized execution that can be controlled if the system administrator is the only person who can control privilege to server programs (Vacca, 2009). The Local Area Network should not remain operational past the normal working hours by installing a limited configuration to the system. Apart from configuring clerk and supervisory functions, there should be constant managerial reviews and auditing to check for any unauthorized execution (Newman, 2009). Errors experienced during entry of data can be minimized by entering time and attendance sheets in duplicate.

Accidental corruption in information systems can be controlled by having a special program that limits access to the system server (Kizza, 2008). The loss of time and attendance data is prevented by having backups of the server disks incase of a disaster or any accidental loss. The time and attendance data can also be left to be online for three years before the data is taken and stored in the archives. HGA has policies in place that are supposed to ensure there is continuity in all the major operations of the agency. One of the major security threats in HGA’s computer system is constant interruption of its operations by various reasons (Kizza, 2008). The threat of interruption of operations is controlled by developing contingency plans that are supposed to ensure that adverse circumstance does not interfere with continuity of operations (Newman, 2009).

In conclusion, it is important to note that biometric systems are very important in any Information Technology environment. Information systems have network-related and virus threats that require biometric measures in order to protect the system and ensure security of information (Kizza, 2008). The risk assessment team reports all the threats found in the system so that all fraud vulnerabilities are mitigated as soon as possible. Authentication mechanisms are very key to solving the problem of payroll fraud through time and attendance data. All the paper work procedures and information handling procedures must comply with HGA’s policies to safeguard the system against all forms of corruption (Vacca, 2009). Regular auditing and protection of the system from external networks are some of the biometric solutions to information security issues. Information security is essential for the successful operation of any organization.

References

Kizza, J. M. (2008). A guide to computer network security. New York, NY: Springer.

Newman, R. C. (2009). Computer security: Protecting digital resources. New York, NY: Jones & Bartlett Learning.

Vacca, J. R. (2009). Computer and information security handbook. New York, NY: Morgan Kaufmann.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 29). Assessing and Mitigating the Risks to a Hypothetical Computer System. https://ivypanda.com/essays/assessing-and-mitigating-the-risks-to-a-hypothetical-computer-system/

Work Cited

"Assessing and Mitigating the Risks to a Hypothetical Computer System." IvyPanda, 29 Mar. 2022, ivypanda.com/essays/assessing-and-mitigating-the-risks-to-a-hypothetical-computer-system/.

References

IvyPanda. (2022) 'Assessing and Mitigating the Risks to a Hypothetical Computer System'. 29 March.

References

IvyPanda. 2022. "Assessing and Mitigating the Risks to a Hypothetical Computer System." March 29, 2022. https://ivypanda.com/essays/assessing-and-mitigating-the-risks-to-a-hypothetical-computer-system/.

1. IvyPanda. "Assessing and Mitigating the Risks to a Hypothetical Computer System." March 29, 2022. https://ivypanda.com/essays/assessing-and-mitigating-the-risks-to-a-hypothetical-computer-system/.


Bibliography


IvyPanda. "Assessing and Mitigating the Risks to a Hypothetical Computer System." March 29, 2022. https://ivypanda.com/essays/assessing-and-mitigating-the-risks-to-a-hypothetical-computer-system/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
1 / 1