Threat, vulnerability, safeguard and target.

 

Define threat, vulnerability, safeguard and target. Give an example (do not use examples in the book) of each. Explain the types of the threats and security losses. How do laws like GLBA, HIPPA and PCI DSS protect consumers?
What is the goal of IS security? Explain why it is difficult to know the true cost, magnitude and impact of computer crime. List and explain the three procedures that all companies should have in place for each type of information system. Select a company, review their security policy and summarize three things in the policy that stood out to you the most and why.
Senior management should be aware of security threats. Describe two security functions senior management should address. What steps should an organization take when balancing risk and cost? How can human safeguards protect against security threats? Define and explain firewall. Why is malware a serious problem?
Search the Web for the term computer crime and any other related terms. Identify what you think are the FIVE most serious recent (no later than 6 months ago) examples. Create a chart (using Word or Excel) with your findings. Findings should include date(s) of the crime, summary, safeguards that were not in place or ineffective in preventing the crimes.

List the five primary functions of the IS department. Name the four groups found in a typical reporting relationship. Name the four groups found in a typical IS department and explain the major responsibilities.
Explain the importance of strategic alignment as it pertains to IS planning. Explain why maintaining alignment can be difficult. Define CIO, CTO, CSO and CISO.
Define outsourcing. Explain how Drucker’s statement “Your backroom is someone else’s front room” pertains to outsourcing. Create a table (if created in Excel, please copy into Word doc) to summarize the management advantages, cost advantages and risks of outsourcing. Explain why international outsourcing can be advantageous.
Read the security guide on pages 438-439. Respond to discussion question 2 on page 439

Sample Solution

Threat, vulnerability, safeguard and target

Threat – person or organization that seeks to obtain or alter data illegally. Vulnerability is the opportunity for threats to gain access to data. Examples of vulnerability include a weakness in a firewall that lets hackers get into the computer network and lack of security cameras. Safeguard is the measure individuals take to block threat from obtaining data. For example, passwords and other security features add layers of protection if used appropriately. Target is the asset desired by threat. Threats can be classified into four different categories: direct, indirect, veiled, and conditional. A direct threat identifies a specific target and is delivered in a straightforward, clear, and explicit manner.

spokesperson said in a statement that “in the context of our market monitoring following the onset of the financial crisis in late 2007, involving thousands of calls and emails with market participants over a period of many months, we received occasional anecdotal reports from Barclays of problems with Libor (Huffington Post, 2012) . This illustrates that the Federal Bank were aware of the flaw but didn’t take appropriate action towards LIBOR Concerns. Moreover, I believe they did not react for the hope of an economic resurgence. As the financial crash resulted in low “self-esteem” market, The LIBOR value deprecating would nullify this depression and restore the global economy. This benefited Governments around the world, as an impression of alleviating financial markets from disarray, which boosts public confidence in the marketplace.
Despite this, the fluctuation of LIBOR had a massive effect on businesses, investors and ordinary individuals. LIBOR increased proportionately with an increase in the cost of borrowing. The consequences of increasing borrowing costs were passed onto consumers by increasing debt and mortgages. However, investors benefit as savings increase. LIBOR decreasing correlated with a decrease in savings, whilst showing good signs for mortgage holders. Although, individuals believe a decrease in interest rate means paying less on consumer contracts, such as mortgages and credit cards – this contrasted with the occurrence of interest swaps and LIBOR fluctuating both upwards and downwards. Overall, ordinary individuals suffered as the Local Government would lose more money. Services that people benefit from, such as schools, hospitals, fire departments and public services, have placed their money in adjustable rate mortgages, currencies, mutual funds, pensions and derivatives (MGA, 2012). Manipulating the rates has resulted in Banks not pumping profits into these financial instruments. And poorer people with bad credit profiles are disproportionately affected. In Ohio, for example, 90 percent of all subprime mortgages in 2008 were indexed to Libor, double the proportion for prime loans (Liam Vaughan, 2017). Traders on the other end of the transaction also lose out. As Banks collude with each other, it is evitable that some Bank reaps the reward of capitalizing on the manipulation, whilst the other banks and traders must fall victim for the meantime. Due to the vast importance of LIBOR, a tiny manipulation in the wrong direction could result in trillions of pounds being lost.

Critical Evaluation of LIBOR Reforms

Wheatley’s proposal on reform recommendations have been implemented since and have proved successful in maintaining and preventing future manipulation in LIBOR. One of his recommendation’s including the ratification of replacing the British Banking Association as the LIBOR administrator, with the ICE Benchmark Administration (IBA).
Wheatley insisted that banks should submit actual transactions, rather t

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.