d 8

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

510

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

1

Uploaded by DukeTurkeyMaster1233

Report
Many kinds of events can trigger the need for a risk assessment, and depending on the situation and the company involved, one trigger might have a greater impact than another. Some of the triggers that could affect a company’s computer systems to the point where a risk assessment would be required include, but are not limited to: Changes to government regulations, such as new cybersecurity laws that require more detailed disclosures when using personally identifiable information, can affect how a company handles their risks (Patrick, 2023). Because of this, a risk assessment would be needed to review current procedures to make sure they align with any up-to-date cyber policies to ensure the company is remaining compliant and able to protect against new and old methods of networking breaching. A large number of complaints from customers could spark a risk assessment depending on what the customers are complaining about, such as if they noticed that their information was used for a purpose that was not specified in the company’s disclosures (Patrick, 2023). If required project and operational outputs are not met (Patrick, 2023). One such example would be when an upgrade needs to be performed but the necessary software is not provided due to the company being unable to organize and prioritize efficiently. When key project team members become unavailable for any reason and a backup support team is needed, it will be necessary to make sure they understand what they must do to continue performing risk analysis the way the more experienced team was able to perform (Patrick, 2023). One example of this would be when new staff members are hired that don’t have as much experience with the company’s systems as other employees who created previous risk assessment plans. If a company plans to integrate new technology into its systems, such as server software or PC’s that use a newer operating system, the current risk management procedures, and documentation they use would need to be reviewed for any necessary changes or additional information, which could require an entire risk assessment to complete. These particular risks were focused on because of how they can mostly focus on risks that could occur as a result of a flaw within an organization, which is where some of the most problematic breaches can occur. After all, if an organization does not consistently review its current procedures and resources, and make the appropriate changes where they are needed, then not only would the company itself fall into disarray when a breach occurs, but the information associated with the company’s operations will be exposed to the point where the company could even go bankrupt, and any associated individuals could be put in jeopardy.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help