d 8
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
510
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
1
Uploaded by DukeTurkeyMaster1233
Many kinds of events can trigger the need for a risk assessment, and depending on the situation and the
company involved, one trigger might have a greater impact than another. Some of the triggers that could
affect a company’s computer systems to the point where a risk assessment would be required include,
but are not limited to:
Changes to government regulations, such as new cybersecurity laws that require more detailed
disclosures when using personally identifiable information, can affect how a company handles their risks
(Patrick, 2023). Because of this, a risk assessment would be needed to review current procedures to
make sure they align with any up-to-date cyber policies to ensure the company is remaining compliant
and able to protect against new and old methods of networking breaching.
A large number of complaints from customers could spark a risk assessment depending on what the
customers are complaining about, such as if they noticed that their information was used for a purpose
that was not specified in the company’s disclosures (Patrick, 2023).
If required project and operational outputs are not met (Patrick, 2023). One such example would be
when an upgrade needs to be performed but the necessary software is not provided due to the company
being unable to organize and prioritize efficiently.
When key project team members become unavailable for any reason and a backup support team is
needed, it will be necessary to make sure they understand what they must do to continue performing
risk analysis the way the more experienced team was able to perform (Patrick, 2023). One example of
this would be when new staff members are hired that don’t have as much experience with the
company’s systems as other employees who created previous risk assessment plans.
If a company plans to integrate new technology into its systems, such as server software or PC’s that use
a newer operating system, the current risk management procedures, and documentation they use would
need to be reviewed for any necessary changes or additional information, which could require an entire
risk assessment to complete.
These particular risks were focused on because of how they can mostly focus on risks that could occur as
a result of a flaw within an organization, which is where some of the most problematic breaches can
occur. After all, if an organization does not consistently review its current procedures and resources, and
make the appropriate changes where they are needed, then not only would the company itself fall into
disarray when a breach occurs, but the information associated with the company’s operations will be
exposed to the point where the company could even go bankrupt, and any associated individuals could
be put in jeopardy.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help