Business Value of Software Applications

User Generated

sngqnqql

Writing

Description

Purpose of Assignment

Security in the work place is a major concern businesses must address to protect company data. In addition, to automated security, it is also the company's responsibility to implement policies and procedures for the handling of data by company personnel. Students will research risks and threats to digital data and develop security policies all company personnel must be trained on and be held accountable to protect company data.

Assignment Steps

Resources:

  • Internet search engine such as Google™, Yahoo!®, or Bing™.
  • Microsoft® Word 2016
    • Click the "File" tab, then "New" to search for Microsoft® Word Memo Templates
  • Microsoft Office 365, Office 2016: Introductory: Module 1: Creating, Formatting, and Editing a Word Document with a Picture

Part 1

Develop a 1,400-word summary describing the challenges businesses have in securing data in today's technological environment:

  • Include risks and threats of company data.
  • What policies/procedures should be implemented for the handling of data ensure data protection and business continuity?

Use the following features of Microsoft® Word in your summary:

  • A Microsoft® Word memo template.
  • Either a bulleted or numbered list of the new security policies/procedures, and bold or changed font color so this list is highly visible.
  • Highlight the effective date so it stands out.
  • Insert an image that is relevant to the memo content. Images must also be cited and referenced.

Save as a Microsoft® Word document saved under the following format: Lastname_Course#_W2.doc.

Format your assignment consistent with APA guidelines.

Part 2

Develop a 175-word memo announcing the new security policies to all employees taking effect in one month following mandatory training. Search online for a Microsoft® memo template.

Create an eye-catching memo that is clear and to the point concerning the new security policies. APA formatting is not required for this part of the assignment.

Save as a Microsoft® Word document saved under the following format: Lastname_Course#_Memo.doc.

Format your assignment consistent with APA guidelines.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: RISKS AND THREATS TO COMPANY DATA DUE TO CYBERCRIME

Risks and threats to company data because of cybercrime
Name of student
Name of professor
Course date

1

Running head: RISKS AND THREATS TO COMPANY DATA DUE TO CYBERCRIME

Challenges business face in securing data
In the current era there is the use of high-tech technology almost in all sectors; from business to
education, health, science and even in the transport sector. The innovations have proved to be so valuable
especially to the business world where they have created efficiency in the way we carry out transactions from
money transfer to marketing to the delivery of goods and services (Tumkevič, 2017). Money is transacted from
all over the world from the comfort of the home without worries. At the height of all these inventions
criminology has reached the peak especially concerning cyber security, hacking and manipulation of business
data and information to steal finances and valuable information from companies. It is sad that several
companies have lost a lot of money and precious business secrets through cyberattacks and related vices. This
paper is going to describe risks, and threats companies are exposed to and the best strategies to adopt to run
business with less vulnerability and assured business continuity (Tumkevič, 2017).
1.

Threats and risks to a company’s data
Company data face a lot of privacy and integrity risks from unauthorized persons, intruders monitoring

through the internet, and company staff sharing off data. This part illustrates the risks and possible attacks that
can severely expose business data (Castro, 2011).
i.

Data tampering
Secrecy is very crucial during communication to safeguard company details to ensure that no

modifications can be made or exposures made during transportation. The distributed environment come with
potential and mischievous third parties who may penetrate the computer systems and interfere with data as it is
when sent from one site to another. Modifications work in a way that an unsuspected third party on the internet
interrupts data on transmission and alters some sections of it before resending it. For instance, an attacker can
change a bank transaction from $50 to $5000. In the process, the entire system of accurate information is
interpolated on the network. This can be done by repeating a valid $50 bank transfer one hundred times.

2

Running head: RISKS AND THREATS TO COMPANY DATA DUE TO CYBERCRIME

ii.

3

Data theft and Eavesdropping
Here the emph...


Anonymous
Nice! Really impressed with the quality.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Related Tags