Verified Document

Risk Assessment For Gfi Group, Inc. Gfi  Essay

Risk Assessment for GFI Group, Inc. (GFI) RISK ASSESSMENT

Company Network, Interconnection, and Communication Environment

When it comes to the company network, GFI Group, Inc. (GFI) operates as a dealer brokerage company, which was discovered in the U.S. It is in network with over the counter (OTC) related securities and derivative products. The company mostly offers market data brokerage services, and analytics software merchandises to commercial and investment banks, insurance corporations, large businesses and hedge funds in places such as Asia Pacific, North America, and Europe. Furthermore, it offers brokerage services in four broad product classes which consist of credit, equity, financial and commodity. What is more, the company functions through a network of offices in New York, London, Cape Town, Paris, Sydney, Hong Kong, Seoul, Singapore, Tokyo, Englewood Calgary, and Sugar Land. GFI is headquartered in New York City, New York, the U.S.

T As far as Global Finance, Inc. (GFI) interconnection is concerned the world's top networks, carriers and ISPs have recognized strategic points of presence sites and centers all over the globe. Global Finance, Inc. (GFI) boasts the largest number of networks under one roof of any data center provider. With 9M+ ft 2 sq. ft. Of data center capacity across 31 strategic markets in the Americas, EMEA and Asia-Pacific. Global Finance, Inc. (GFI) Global Finance, Inc. (GFI) directly interconnect with every major worldwide network and to satisfy the peering, transit and traffic exchange obligations.

The communication environment has declined over the years at the GFI Group, Inc. (GFI).It is clear that the Business continuity for disaster recovery is considered to be a high priority for GFI and its subsidiaries, as well as GFI Securities, LLC. Our objective is to guarantee our continued ability to serve their clients and to protect their possessions and the individuals and possessions of their company. At the moment, the communication has been a failure due to the fact that its network security has not been able to keep up with the company growth. Their Business Continuity Program (the "program") has been developed to provide reasonable assurance of business communication in the event that there are disruptions of normal operations at the firm's critical services which at the moment are taking place.

Risk Assessment

The risk assessment is helpful for GFI Group, Inc. (GFI) because identify the approaches to be applied for elimination of avoidable risks and the minimization of the risks that are inevitable. The discussions following will restrict the risk assessment to IT connected issues: security, auditing and disaster recovery. Risk assessment is determining two quantities of the risk, the magnitude of the potential loss and the probability that the loss will occur. Risk assessment then is a step in the risk management procedure, http://en.wikipedia.org/wiki/Risk_Assessment. An association has to have procedures in place to manage and identify the certain risks that are involved. Santomero and Oldfield and developed the following guidelines to positively implement the risk management policy that happens to be set up by GFI Group, Inc. (GFI): It has to be essential to the company's business plan.

For that reason, a Risk Assessment and Management project team must be formed to conduct a thorough analysis of the system and provide policies and recommendations to deal with disaster. At GFI Group, Inc. (GFI), the design of the system network will affect auditing security, and disaster recovery, as a result a comprehensive analysis of the network design, security and disaster recovery will go a long way to mitigate against all of the possible risks.

Disasters, Backup and Recovery Plan

GFI Group, Inc. (GFI) has to have data which is based on analysis of risk factors that are also based on their probability and progressive nature of incidence accessible to mature the backup and recovery plans. However, this data could possibly be utilized in order to create effective and balanced measures for mitigation, loss prevention, mitigation, and recovery.

Disasters can be classified into three broad categories:

1. Technical Disasters: Equipment Failure, Loss of A/C, Software Failure, Database Service Failure, Loss of Power.

2. Natural Disasters: Fire, Tsunami, Earthquake, Flood, Airplane Impact, High Winds, Human-Caused Disasters: Theft, Vandalism, Virus,

3. Unauthorized Access: Tampering, Code/Data Error

Measures that will have to be taking to mitigate technical disasters consist of the following:

1. UPS for every one of the critical devices.

2. Deliberate the use of localized (directed) cooling and maintain back-up equipment cooling procedures.

Risk Assessment:...

Parts of this document are hidden

View Full Document
svg-one

Physical security which consist of right of entry to the plants, to the rooms housing servers and other computing maneuvers.
2. External threats that involve the computing network

Access and permission to authorized users of the system

Physical security will involve the company securing its assets by devices for instance alarm system for off hour utilization, and identification cards for workers. A process will need to be should in place to make sure that guests are correctly identified before getting any kind of assess to the facility. Users will not be able to take computer home except they are protected by the encryption software. Also downloading proprietary data onto CD, floppies, thumb/flash/memory drives and other portable media will need to be rejected unless such dealings are pre-approved and appropriate security actions are then taken.

Any enterprise will have to pay special consideration to computer security. Computer security is considered to be a field that is bothered with the control of risks connected to the utilization of the computer. A main focus will need to be on the external threats to the computing environment. In enterprise with branches cross country, it is important to allow information from "trusted" external sources, and disallow intrusion from non-trusted or anonymous sources. In a secure system, those that are the official users of that system are still able to do what they are supposed to do. Strong verification approaches can be used to safeguard that communication end-points of who they say they are, for instance, passwords should have no less than 8 complex character and must be changed every 130 or so days. Furthermore, ability and admission control list methods can be used to make sure privilege separation and mandatory access control are in order.

Mandatory access control is something that will be utilized in order to make that privileged entry is removed when rights are rescinded. Passwords are considered to be one of the most usually used approaches of authenticating user authority. Chain of trust practices can be utilized to endeavor to make sure that all software inserted has been certified as true by the system's designers. Merely official users will need to be able to set up software on the system.

Firewalls are software and/or hardware mechanisms that protect computers from those that are considered to be intruders. However, the firewall will not permit anything to enter come into the computing environment without the accurate markings. Every kind of the networks requires a firewall in order to keep out files and people that are dangerous to the system. In a production arrangement, an application that offers no way to cover already known security errors do not need to be used until the fix is made obtainable. Publicly recognized flaws are the main entry utilized by worms to routinely break into a system and then extend to other systems that are in connection with it. Secunia.com is an enterprise that looks over vulnerabilities in over 13,000 merchandises (Patton, 2003). Secunia's site is something that needs to be put to use as a search instrument for unpatched recognized defects in products that are popular. Software that is Anti-virus quarantines or deletes viruses on your computer, in principle shielding a person against viruses. However, this software once it gets on the computer will of course need to be updated from time to time, as there are new viruses made every day. There are a few things that are vital section of any software that is antivirus, one will need to look for a good discovery rate, compatibility with the companies system, easy to use, and must have the capability to make it update (Crump, 2009). Intrusion-detection systems are able to scan a network for individuals that are on the network but then again who should not be there or are doing things that they should not be doing, for instance trying out a lot of passwords to gain admission to the network.

Cryptographic Methods

In the future, as GFI Group, Inc. (GFI) expands, cryptographic methods can be utilized in order to defend information that is in transit among systems, decreasing the probability that data replaced among systems can be modified or intercepted. Computer security is considered to be an area of computer science that is concerned with the control of risks connected to the use of a computer. There are two dissimilar methods to security when it comes down to the computing. One puts the emphases mostly on external threats, and usually treats the computer system itself as a system that is trustworthy (Crump, 2009). In a secure system, the official users of that system are still capable of doing whatever they need to do.

GFI Group, Inc. (GFI)…

Sources used in this document:
References:

Crump, K.S. (2009). Quantitative risk assessment since the red book: Where have we come and where should we be going? Human and Ecological Risk Assessment, 9(5), 1105-1112.

Patton, D.E. (2003). The risk assessment paradigm as a blueprint for environmental research. Human and Ecological Risk Assessment,, 9(5), 1337-1348.

Suter, G.W. (2006). Ecological risk assessment and ecological epidemiology for contaminated sites. Human and Ecological Risk Assessment, 22(9), 31-38.
Cite this Document:
Copy Bibliography Citation

Related Documents

Risk Assessment Is an Integral Aspect on
Words: 2820 Length: 10 Document Type: Essay

Risk Assessment is an integral aspect on any business irrespective of industry. Every business has some form of inherent risk embedded within its underlying business operations. This risk, through proper assessment can be minimized and practically prevented under certain conditions. Through proper risk assessments, businesses can abate the influences of danger that ultimately erodes both profitability, and reputation. In addition, risk assessments allow the company to reduce the prevalence of

Risk Assessments for Falls Risk
Words: 1509 Length: 5 Document Type: Essay

As the percentage of older Americans continues to increase, the need for timely and accurate assessment screens and the formulation of effective clinical interventions will become even more pronounced. Fortunately, the research also showed that there are a number of assessment tools that are available to facilitate the process, including sophisticated multifactor instruments with proven validity and reliability. One of the more important issues to emerge from the research

Risk Assessment Report of the
Words: 2612 Length: 9 Document Type: Assessment

Functional description The Public Health Informatics and Technology Program's IT system was developed by the Office of Surveillance, Epidemiology, and Laboratory Services (OSELS).The CDC division response for its deployment and maintenance is the Division of Informatics Research and Development (DIRD) whose role is to advance the frontiers of public health informatics by means of appropriate research and development. The DIRD division is to collaborate with the other members of the CDC

Risk Assessment Program
Words: 3310 Length: 13 Document Type: Term Paper

Risk Assessment Program Over the last several years, many small and medium sized businesses have been turning to cloud computing as a way of storing, retrieving and accessing vital information. This is when a third party provider will offer firms with these services at a fraction of the cost of traditional IT departments. Moreover, there is unlimited storage capacity and firms can readily protect themselves against vulnerabilities at a particular site.

Risk Assessment: El Dorado Hills,
Words: 681 Length: 2 Document Type: Assessment

Man-made risks are significant, and include fire and pollution. Fire can occur in residential, commercial, or wildland form. Fire occurs as a result of human error at home or in the workplace. Wildland fires can start as a result of unsupervised campfires burning matches or live cigarettes (El Dorado Hills Fire Dept, 2010). Because the rainfall per year for the area is fairly low, wildland fires are a significant risk.

Risk Assessment of Four-Year-Old Girl We Each
Words: 1026 Length: 4 Document Type: Case Study

Risk Assessment of Four-year-Old Girl We each have a range of possibilities before us from the moment that we are born. However, we are each also at least in some ways limited from the moment of our birth because we do not come into the world as if we were a blank slate. This paper examines the ways in which one child had many of her "choices" already made for her.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now