Notice: Trying to access array offset on value of type bool in /home/flixwrit/domains/ on line 2421
Expert answer:Quantitative vs. Qualitative Analysis Assignments - Ray writers

Solved by verified expert:Quantitative vs. Qualitative Analysis AssignmentsFor this assignment, you will need to perform a quantitative analysis on the below scenario. Please write your response in a brief APA formatted report. Quantitative AnalysisYou are the manager of desktop support for NASA. You are responsible for purchasing and managing all of the laptops NASA distributes to employees. There are 700 laptops currently in service. All of the laptops randomly leave the building and serve a mobile workforce. Read the following articles your CIO brought to you for consideration: the SLE, ARO, ALE and safeguard value based on the information in these articles for a report your CIO plans to submit as a solution. For the safeguard value, find and price an appropriate physical and software solution(s) to safeguard theft and data loss. Once you pick a product, include a link to the page for pricing and item description. Present the realized savings in your report and the benefits of the solution you choose for safeguarding the laptops. Don’t forget to include your equations for ARO, ALE, safeguard value and realized savings calculations. Quantitative vs. Qualitative Analysis AssignmentsFor this assignment, you will need to perform a qualitative analysis on the below scenario. Please write your response in a spreadsheet.Qualitative AnalysisFor this part of the assignment, you can use the work you performed for last week. Take those 7 risks and arrange them into a spreadsheet. Perform a probability assessment and write about the impact of the risk for each of the 7, based on the geographical location of last week’s assignment(attached). Use the following format:CategoryProbability (0.0-1.0)Impact (0-100)Risk Level (P x I)DescriptionZombies.02901.8Zombie Apocalypse causes wide spread panic and physical security threats to staff, property and business operations.

Unformatted Attachment Preview

Don't use plagiarized sources. Get Your Custom Essay on
Expert answer:Quantitative vs. Qualitative Analysis Assignments
Just from $10/Page
Order Essay

The Worst That Could Happen
Student’s Name:
Instructor Name:
Course Name:
Threats in Firms
While working for any firm, various threats are expected, especially when working in the
security department. As a security officer, one is supposed to be keen and understand the kind of
risks that are expected and their effects when they happen. Then one has to determine ways of
avoiding these threats at every department. Multiple departments, such as I.T., finance, among
others, have a different kind of threats (Hermanson, D. R., 2005).
In the I.T. department, there are threats such as viruses and worms. They are very
destructive in a computer, and once it affects the computers or systems, it affects the core of the
system and makes the network not function properly. They may also lead to files or relevant
documents getting lost or being distorted. To avoid all this, the best way is to install antiviruses in
your computers to help prevent any viruses (Prabhala, N., 2014).
The virus bears by embedding a copy of itself into and enhancing part of another schedule.
The virus spreads from one computer to another. It ranges in acerbity from causing lightly
aggravating impacts to detrimental data or software and creating a rebuttal of service conditions.
The viruses overwrite themselves to other programs with copies of themselves which host the host
program generally.
Also, the worms enter into the computer through amenability in the scheme and take
advantage of file transport characteristics on the network. There are other more advanced worms
clout encryption, wipers, and ransomware technologies to harm their targets. The viruses and
worms can be combated through implementing the first line of armor appliances which can help
in scaling. Also, companies should adhere to approaches and procedures for application and
appliance chunking. There should be the employment of network segmentation, which will help
to reduce outbreak exposures. Organizations should perform more profound and more advanced
analytics in the process of lowering harms and also reviewing the security systems and probing
the use of SSL data.
Another kind of threat is hacking. This is where people or users from outside illegally gain
access to the computer and every document that is inside. The worst thing that happens during
hacking is that it is possible for one to change the readings of papers or to interfere with the ratings
in a marketing firm. One can also divert resources or money to their accounts through hacking.
The best way to avoid this is by ensuring that the system is well protected from hacking by having
security software (Raymond, L., 1993).
There are also compliance threats that a company may face, for example, failing to comply
with the tax returns. If a firm has been evading tax, it may be risking being fined heavily at the end
of it all. This costs a firm too much money and can even end up bankrupt. Failing to comply with
the standards can also have the firm risking closure. These means that people lose their jobs and
end up unemployed (Hermanson, D. R., 2005).
There also are financial threats in firms. Firms have to be accountable enough to ensure
that every expenditure is recorded and reduced as well as the management of debts and creditors.
A significant crisis will occur in a firm if this is not managed well and balanced. The firm can end
up bankrupt and risk closure since it is not capable of running its operations. There can also be
laying off of employees as a way of reducing expenditure, which is not suitable for the economy
due to increased unemployment, (Prabhala, N., 2014).
Some of the financial threats include the extortion which is typically delivered from
massive botnets of computers which are used to bring down the commercial networks in the firm.
The server in the firm is targeted and overwhelmed by multiple compromised systems. The threat
acts like a traffic jam clogging up the highway preventing regular traffic. Also, the financial risk
is done through spear phishing whereby the cybercriminals send out targeted emails from a known
firm in the process of tricking the recipient giving out confidential information. The attackers also
target unwitting employees to wire money from the firm. The attacker will purport to be either
C.E.O. or manager of the firm and request massive money transfer to bogus accounts. Other
attackers use breach methods to extract data on a bigger scale. The process takes an organized
crime syndicate, and the attacker has a highly sophisticated setup.
There also are operational threats such as theft. Theft of items in a firm brings about
unexpected expenditure. For example, when an essential machine in a firm is stolen or breaks
down, it has to be replaced so that the operations can continue. These unplanned expenditures,
some of which can end up being too expensive, may end up affecting timely payment of
employee’s salary, which affects the operations negatively. If the machines also are damaged, they
may affect the quality of products hence affecting the sales adversely, (Raymond, L., 1993).
There are also strategic risks which can be experienced in a firm. For example, failing to
consider what will happen after introducing a new product in the market can end up being a
significant loss. If you place the product at a higher price, and a competitor brings the same product
at a lower price, it will lead to huge losses, which means that the revenue collection will be down.
One, too, can introduce a product of lower quality than that of the competitor and end up making
losses, (Stulz, R. M., 2006).
There too are threats that are beyond the control of anyone such as earthquakes, famine, or
floods. An earthquake ends up destroying buildings and infrastructure. Hunger will reduce the
intake of luxurious products, which affects the sales of the firm if it deals with them. Floods lead
to the destruction of assets such as buildings, machines which will end up requiring replacement,
which can be expensive, (Hermanson, D. R., 2005).
Beasley, M. S., Clune, R., & Hermanson, D. R. (2005). Enterprise risk management: An empirical
analysis of factors associated with the extent of implementation. Journal of accounting and
public policy, 24(6), 521-531.
Blili, S., & Raymond, L. (1993). Information technology: Threats and opportunities for small and
medium-sized enterprises. International journal of information management, 13(6), 439448.
Hoberg, G., Phillips, G., & Prabhala, N. (2014). Product market threats, payouts, and financial
flexibility. The Journal of Finance, 69(1), 293-324.
Nocco, B. W., & Stulz, R. M. (2006). Enterprise risk management: Theory and practice. Journal
of applied corporate finance, 18(4), 8-20.

Purchase answer to see full

Ray writers

Order your essay today and save 30% with the discount code ESSAYSHELP