Verified Document

Risk Assessment Analysis Of Phishing Research Paper

This means that you must train employees how to identify various forms of phishing. At the same time, you must implement some kind of security procedures that will place a restriction, on how personal information is distributed. For example, employees could be trained in spotting various kinds of fictitious emails. However, when they run across an email like that is requesting information, there would be a procedure where the company will call the customer at the telephone number on file. This is significant, because it will improve the vigilance of: employees involving various phishing related emails. If for some reason, one happens to go through, no information can be released until you contact the customer at the telephone number they provide. This will prevent phishing, by having an initial process for detecting vulnerabilities and having some kinds of checks / balances in place. (Goldman, 2009) Once you have an effective procedure, you want to begin testing the underlying risks related to phishing. This is where you would have a team of security consultants, who would test the staff for various vulnerabilities using the latest techniques / scams. Over the course of time, this will...

At which point, the chances decrease, that any kind of sensitive information will be compromised due to phishing. (Goldman, 2009)
Clearly, any business that conducts a risk assessment using the above tactics will be able to adapt to the changes that are occurring in various phishing related scams. This is because the strategy involves: flexibility and constantly monitoring for vulnerabilities. When any kind of entity is engaged in these two preventive actions, the odds decrease dramatically that they will lose any kind of sensitive information. At which point, the organization can focus on serving customer, while protecting all information at the same time.

Bibliography

Phishing. (2010). Retrieved June 24, 2010 you're your Dictionary website: http://www.yourdictionary.com/computer/phishing

Goldman, P. (2009). The Scam Model. Anti-Fraud Risk and Control Workbook (pp. 103 -- 105). Hoboken, NJ: Wiley.

Jones, a. (2005). Risk Analysis. Risk Management for Computer Security (pp 198 -- 204). Burlington,…

Sources used in this document:
Bibliography

Phishing. (2010). Retrieved June 24, 2010 you're your Dictionary website: http://www.yourdictionary.com/computer/phishing

Goldman, P. (2009). The Scam Model. Anti-Fraud Risk and Control Workbook (pp. 103 -- 105). Hoboken, NJ: Wiley.

Jones, a. (2005). Risk Analysis. Risk Management for Computer Security (pp 198 -- 204). Burlington, MA: Elsevier
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Program Network Risk Assessment
Words: 1927 Length: 7 Document Type: Term Paper

Tracking normal activity patterns of users is essential to enable abnormal activity to be flagged. Also, unintentional user errors such as logging onto unsecure websites and opening up potentially infected documents must be flagged. Sending an email from an odd-looking address and seeing if employees open the email is one way to gage the relative wariness of employees. If employees open up the email, it staff can include a

Risk Identification in Information Security
Words: 5004 Length: 15 Document Type: Thesis

Phishing Spear Phishing and Pharming The following is intended to provide a very brief overview of examples of some the most dangerous and pervasive security risks in the online and networked world. One of the most insidious of identity theft is known as phishing. The term 'phishing' refers to the practice of "fishing for information." This term was originally used to describe "phishing" for credit card numbers and other sensitive information

IT Security Assessments Process of Matching Security
Words: 3712 Length: 12 Document Type: Essay

IT Security Assessments (Process of matching security policies against the architecture of the system in order to measure compliance The systems security assessment is the method of creating a security policy that would be complimentary to the architecture of the system and the method would allow for the measure of compliance. Security assessments are activities that belong to the phase of the design cycle, and that is because it is

Jersey Shore Boardwalk E-Commerce Company Assessment for
Words: 1908 Length: 5 Document Type: SWOT

Jersey Shore Boardwalk e-Commerce Company Assessment for a New Jersey Shore Boardwalk Clothing Store Adopting e-Commerce In assessing the potential of a Jersey Shore-based clothing store adopting e-commerce there are several considerations that need to be taken into account. First and most significant are the relative strengths, weaknesses, opportunities and threats (SWOT) of choosing to extend the business online. A SWOT analysis is provided as part of this analysis to help guide

Looking Into Traffic Analysis for Homeland Security
Words: 3514 Length: 10 Document Type: White Paper

Traffic Analysis/Homeland Security One of the biggest challenges currently faced by the Department of Homeland Security is guaranteeing cybersecurity. Each and every day some type of cyber crime occurs. Such crimes have the potential to affect the country's national security. This paper investigates the significance of internet traffic and analysis to Homeland Security. It will look at the importance of internet traffic and analysis to Homeland Security as well as encrypted

Released by the FBI and
Words: 17274 Length: 65 Document Type: Research Proposal

" Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior"). Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This analysis takes into consideration the risks these event pose to businesses individuals and governments. Within the domain of information technology risk analysis reports are utilized to tailor technology-related objectives with a an organization's business objectives.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now