Verified Document

Risk Assessment Analysis Of Phishing Research Paper

This means that you must train employees how to identify various forms of phishing. At the same time, you must implement some kind of security procedures that will place a restriction, on how personal information is distributed. For example, employees could be trained in spotting various kinds of fictitious emails. However, when they run across an email like that is requesting information, there would be a procedure where the company will call the customer at the telephone number on file. This is significant, because it will improve the vigilance of: employees involving various phishing related emails. If for some reason, one happens to go through, no information can be released until you contact the customer at the telephone number they provide. This will prevent phishing, by having an initial process for detecting vulnerabilities and having some kinds of checks / balances in place. (Goldman, 2009) Once you have an effective procedure, you want to begin testing the underlying risks related to phishing. This is where you would have a team of security consultants, who would test the staff for various vulnerabilities using the latest techniques / scams. Over the course of time, this will...

Parts of this document are hidden

View Full Document
svg-one

At which point, the chances decrease, that any kind of sensitive information will be compromised due to phishing. (Goldman, 2009)
Clearly, any business that conducts a risk assessment using the above tactics will be able to adapt to the changes that are occurring in various phishing related scams. This is because the strategy involves: flexibility and constantly monitoring for vulnerabilities. When any kind of entity is engaged in these two preventive actions, the odds decrease dramatically that they will lose any kind of sensitive information. At which point, the organization can focus on serving customer, while protecting all information at the same time.

Bibliography

Phishing. (2010). Retrieved June 24, 2010 you're your Dictionary website: http://www.yourdictionary.com/computer/phishing

Goldman, P. (2009). The Scam Model. Anti-Fraud Risk and Control Workbook (pp. 103 -- 105). Hoboken, NJ: Wiley.

Jones, a. (2005). Risk Analysis. Risk Management for Computer Security (pp 198 -- 204). Burlington,…

Sources used in this document:
Bibliography

Phishing. (2010). Retrieved June 24, 2010 you're your Dictionary website: http://www.yourdictionary.com/computer/phishing

Goldman, P. (2009). The Scam Model. Anti-Fraud Risk and Control Workbook (pp. 103 -- 105). Hoboken, NJ: Wiley.

Jones, a. (2005). Risk Analysis. Risk Management for Computer Security (pp 198 -- 204). Burlington, MA: Elsevier
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now