Assessing and Mitigating the Risks to a Hypothetical Computer System Research Paper

Exclusively available on IvyPanda Available only on IvyPanda

The security of information is very important for the success of any organization and therefore should be given the first priority in the organization’s strategic plans. The computer system of a Hypothetical Government Agency (HGA) faces quite a number of information security threats that need to be brought under control for the agency to operate efficiently (Newman, 2009). Some of the major threats to HGA’s computer system include accidental loss of information, virus contamination, theft, unauthorized access and natural disasters. This paper will highlight some of the Biometric solutions the agency has put in place to address computer security issues and finally assess the role of Biometric systems in an Information Technology environment.

We will write a custom essay on your topic a custom Research Paper on Assessing and Mitigating the Risks to a Hypothetical Computer System
808 writers online

Payroll fraud and errors is one of the major security issues that occur due to inadequate information security system (Vacca, 2009). This threat can be solved by initiating an automated payroll process that is in line with both Government and HGA’s information security policies. The time and attendance data should be concealed as much as possible to reduce chances of manipulation. The other security threat is unauthorized execution that can be controlled if the system administrator is the only person who can control privilege to server programs (Vacca, 2009). The Local Area Network should not remain operational past the normal working hours by installing a limited configuration to the system. Apart from configuring clerk and supervisory functions, there should be constant managerial reviews and auditing to check for any unauthorized execution (Newman, 2009). Errors experienced during entry of data can be minimized by entering time and attendance sheets in duplicate.

Accidental corruption in information systems can be controlled by having a special program that limits access to the system server (Kizza, 2008). The loss of time and attendance data is prevented by having backups of the server disks incase of a disaster or any accidental loss. The time and attendance data can also be left to be online for three years before the data is taken and stored in the archives. HGA has policies in place that are supposed to ensure there is continuity in all the major operations of the agency. One of the major security threats in HGA’s computer system is constant interruption of its operations by various reasons (Kizza, 2008). The threat of interruption of operations is controlled by developing contingency plans that are supposed to ensure that adverse circumstance does not interfere with continuity of operations (Newman, 2009).

In conclusion, it is important to note that biometric systems are very important in any Information Technology environment. Information systems have network-related and virus threats that require biometric measures in order to protect the system and ensure security of information (Kizza, 2008). The risk assessment team reports all the threats found in the system so that all fraud vulnerabilities are mitigated as soon as possible. Authentication mechanisms are very key to solving the problem of payroll fraud through time and attendance data. All the paper work procedures and information handling procedures must comply with HGA’s policies to safeguard the system against all forms of corruption (Vacca, 2009). Regular auditing and protection of the system from external networks are some of the biometric solutions to information security issues. Information security is essential for the successful operation of any organization.

References

Kizza, J. M. (2008). A guide to computer network security. New York, NY: Springer.

Newman, R. C. (2009). Computer security: Protecting digital resources. New York, NY: Jones & Bartlett Learning.

Vacca, J. R. (2009). Computer and information security handbook. New York, NY: Morgan Kaufmann.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper
Print
Need an custom research paper on Assessing and Mitigating the Risks to a Hypothetical Computer S... written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, March 29). Assessing and Mitigating the Risks to a Hypothetical Computer System. https://ivypanda.com/essays/assessing-and-mitigating-the-risks-to-a-hypothetical-computer-system/

Work Cited

"Assessing and Mitigating the Risks to a Hypothetical Computer System." IvyPanda, 29 Mar. 2022, ivypanda.com/essays/assessing-and-mitigating-the-risks-to-a-hypothetical-computer-system/.

References

IvyPanda. (2022) 'Assessing and Mitigating the Risks to a Hypothetical Computer System'. 29 March.

References

IvyPanda. 2022. "Assessing and Mitigating the Risks to a Hypothetical Computer System." March 29, 2022. https://ivypanda.com/essays/assessing-and-mitigating-the-risks-to-a-hypothetical-computer-system/.

1. IvyPanda. "Assessing and Mitigating the Risks to a Hypothetical Computer System." March 29, 2022. https://ivypanda.com/essays/assessing-and-mitigating-the-risks-to-a-hypothetical-computer-system/.


Bibliography


IvyPanda. "Assessing and Mitigating the Risks to a Hypothetical Computer System." March 29, 2022. https://ivypanda.com/essays/assessing-and-mitigating-the-risks-to-a-hypothetical-computer-system/.

Powered by CiteTotal, easy citation creator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1