Sample Essay on:
Data Risk and Protection

Here is the synopsis of our sample research paper on Data Risk and Protection. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 5 page paper considers the risks that may be present when a new computer system is put into place, these include security issues, physical and software threats and employee policies. The paper also considers how an organisation can protect against these various threats. The bibliography cites 5 sources.

Page Count:

5 pages (~225 words per page)

File: TS14_TEdatrsk.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

does it hold organisation information, it also holds personal information about third parties, whom the tax office will have a legal liability to protect. If we first consider the types of risk that may exist we may then go on to consider how these risks may be minimised or eliminated. The first potential risk is that of security internally and externally as well as the protection of the integrity of the information. In the software risks the main risk must be seen as hacking, and as recent incidents where even Microsoft have had their security breached and been hacked, in the case of Microsoft it was their hotmail accounts that were compromised. This may not seem very important, but when we also consider a recent report of the theft of over a million credit card numbers for in excess of forty e banking and e commerce site we can start to appreciate the scale of the problem (Levitt, 2000). For the tax service hackers may be seeking to gain information, to change information or even to collapse the system. There are four main phases to hacking are information gathering regarding the target, the exploitation of any potential vulnerabilities that have been discovered in stage 1, the actual hacking, either to gain the information, remove funds or sabotage the software, and finally the withdrawal of the hacker from the system and the process of covering the tracks (Barrett, 2000). This may include the erasing or altering of logs (Barrett, 2000). There is no way of being 100% secure, but a knowledge of the way hackers work may be seen as helpful. Methods of prevention include the use of firewalls as well as encryption, as ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now