Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Compose a 250 words assignment on cost-benefit analysis. Needs to be plagiarism free!

Compose a 250 words assignment on cost-benefit analysis. Needs to be plagiarism free! Risk management is important in ensuring that the company runs smoothly and that any vulnerability are d and dealt with (Gantz & Philpott 3). Microsoft is a company that deals with technology-based products like computers, smartphones, and laptops among many other products essential in the world of technology.

Some of the assets of Microsoft are people, hardware, and software. Some of the threats to software are intellectual properties. The threats to equipment are copyright issues.

People especially the employees can be a threat to the organization. They can give out information that is sensitive and that can give competitors an edge over the company. Being a company dealing with technology any leak of information to competitors gives them an advantage since they may decide to initiate the plans of the company while adding to them and owning them. The company should limit access to sensitive information and, as a result, prevent any leakage (Gantz & Philpott 4).

Another threat is software attacks. The company may produce software that is vulnerable to certain software. People may decide to purchase alternative software if the problem persists. Trojans, worms and viruses that significantly affect the working of the software, may attack the software. Operating system update is instrumental in dealing with malicious software.

Hardware encompasses the threat of theft. The theft of the hardware may be through employees or strangers who visit the various companies. The theft can occur during civil disturbances where there is no guarantee of security. Hardware can also be damaged when in transit or at the shops. Checkpoints and increased surveillance of premises are necessary where any suspicious activity is not instantly and dealt with immediately (Gantz & Philpott 4).

The assumptions on asset value were based on their current values in the market, value to competitors, the replacement of an asset if lost and any compromising issues arising from external forces. The effects of liabilities in case of a compromised asset were put into consideration. I had to make the assumptions because hard data is not easily available though one could quantify the assets efficiently based on the expensive technological products. The frequency of the threats would be a challenge though in the technical business companies deal with similar products and therefore software violations can occur. The challenges were many as the determination of the many controls in the market and their differing prices. The choice of an effective control like setting up firewall was challenging since most of the products offer similar services but have different prices. The choice of an effective control like setting up a firewall was challenging since most of the products offer similar services but have different prices. The CBA results are quite promising and show the performance of the items after the controls are added.

Works Cited

Gantz, Stephen D, and Daniel R. Philpott. Fisma and the Risk Management Framework: The New Practice of Federal Cyber Security. Boston: Syngress, 2013. Internet resource.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question