Answered You can hire a professional tutor to get the answer.

QUESTION

Hello, I am looking for someone to write an article on GAP Analysis. It needs to be at least 1500 words.

Hello, I am looking for someone to write an article on GAP Analysis. It needs to be at least 1500 words. Risk assessment however identifies issues, risks, and challenges that could threaten this position, and this report offers an analysis of the factors and recommends a security strategy and security solution for managing the risks, issues and challenges. The report is organized into five sections for clarity.

Scope of the company’s operations that include clearing deposits and processing proof of deposits, as well as item processing and data storage and retrieval identify exposure to diversified security and technological issues. “Integrity and authentication” as well as confidentiality are some of the security issues that are apparent to the company’s operations, based on the assessment (The United Nations, 2007, p. 31). Ease of alteration of electronic data offers threats to unauthorized changes and difficulty in detecting such changes or the times at which the changes are made. Assessment results show that the company’s system has not been updated since January 2009 and that its disaster recovery and business plans have not been tested (Camara, Crossler, Midha, & Wallace, 2011). These expose the company to integrity and authentication issues among its employees as fraudulent programs could lead to undetected malicious errors. Even though disaster recovery and business continuity master plans were developed, with intention of modification at facility levels, some facilities have not customized and implemented the plan, factors that also offer the threat of malicious data loss. Assessment results also note that measures for addressing security incidents towards preservation of evidence lack and means easy leak of information and data, contrary to expectations of confidentiality doctrine. This also extends privacy, as a security issue.

Repudiation issues are another security based concern (Chhabra, 2013) that is imminent in the company’s system.&nbsp.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question