Access over 20 million homework & study documents

search

Threat Analysis.

Subject

Business

Type

Essay

Rating

Showing Page:
1/10
Running head: THREAT ANALYSIS 1
Threat Analysis
Name
Institution
Date:

Sign up to view the full document!

lock_open Sign Up
THREAT ANALYSIS 2
To be competitive in the modern dynamic business environment organization have to
involve itself in some major activities. This activity includes doing an analysis of its threats
weakness as well as strengths and opportunities. This is what is referred to as SWOT analysis in
the business sector. All this factors affects business involvement in the market. In this paper we
discuss how internal and external threats affect the organizations competitiveness in the modern
market. We discuss some of the common and basic threats that face organizations in the real
world. The paper partially discusses how to identify the threats and deal with them accordingly.
Threats are those factors that are likely to affect the smooth operations of the organization
threats as well as hindering achievement of goals. Before designing a strategic plan, the
management should take time to analyze these hindrances with the aim of putting the right
measures. The threats can originate both from internal through the employees or management or
externally through competitors and customers and the community while others are natural.
Some of the internal threats are malicious activities such as fraud, theft and blackmailing
which are crafted and perpetrated by the insiders. This activities may lead too loss of data and
properties as well as finances. Other internal threats include sabotage; where an employee
facilitates reach of information and uses such information to perform malicious activities either
personally or by use of an external force. For example, a manager can facilitate robbery of the
organizations safe for personal gains.
Other organizations have faced internal vandalism and looting of its assets. This is
facilitated by the individuals who want to make finances from the organization assets. They take
advantage security weaknesses and poor management of property and information. The
destruction or loss of such properties can expose an organization to disasters.

Sign up to view the full document!

lock_open Sign Up
THREAT ANALYSIS 3
The severest internal threat is the communication failure. Businesses depend on
information to undertake their day-to-day activities and such failure or miscommunication both
from the management to the employees or in the other direction may slow down the operations
and lead to loss. Communication failure is also facilitated to poor selection of channels as well as
lack of clear job description For example, a supervisor may need to give urgent information to a
fellow supervisor in another department; he or she decides to send the message through one of
his subordinates who is at time involved in other activities. In the end the person may forget the
original statement or even fail to deliver the message at the end. This failure may pose a great
risk to the well being of the organization.
The employees may facilitate all types of malpractices in the organization including theft
and sabotage (Cole and Ring, 2006). Despite having an appealing business plan and a future
strategy, the organization may fail to grow due to lack of employee’s commitment. These may
result from dissatisfaction or unfriendly working condition as well as discrimination. Employees
who feel dissatisfied may result practices such as mass action as well as go-slows which in turn
leads to loss. High rate of employee turnover may also be experienced and hence the
organization loses its talent.
In most recent development, advancement in technology has been changing each day,
these has increased the threat of data theft through such actions such as cyber theft among other
malicious internet crimes. These threats mainly aim at the information system of the firm and can
originate from internal through sabotage or externally through the use of malicious software that
monitor the system or tap information that is moving in a network

Sign up to view the full document!

lock_open Sign Up

Anonymous
Excellent! Definitely coming back for more study materials.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4