Risk and Vulnerability Analysis Research Paper

Total Length: 692 words ( 2 double-spaced pages)

Total Sources: 4

Page 1 of 2

Threat Identification

The threats

How the threats are detected

Ever since the September 11, 2001 terrorist attacks, businesses have had to critically rethink on the level of adequacy of their disaster recovery arrangements in relation to their business continuity plans as noted by Lam (2002,p.19). The September 11, 2001 tragedy effectively highlighted the importance for organizations to continue with their commercial operations even under the most exceptional of circumstance. My business which has a considerable e-commerce operation is particularly vulnerable to the IT related threats. It is therefore crucial that these threats be identified and eliminated or mitigated before they result to loss of revenue.

In my business, I face several threats. However, the ones that I consider most dominant are technology threats and information threats. These threats can cause a major disruption to the to business continuity planning (BCP) cycle. Technology threats include natural disasters like fire and flooding, system failure, network failure, virus attack as well as network and system flooding (Distributed denial of service attack-DDoS attack ). Information threats on the other hand include hacking incidents, theft, fabrication, fraud, misuse, fire as well as natural disasters.

Stuck Writing Your "Risk and Vulnerability Analysis" Research Paper?

These are factors which can lead to information loss, unauthorized access as well as alteration of information.

In our organization, a worse case scenario analysis indicates that system failure and information hacking are the most common threats that can effectively cripple the operation of the organization.

The threats

Business threat 1: System failure

This is a threat to business continuity that affects technology as a resource.

Failure scenario1: Failure affecting some servers with a repair time of between 1 to 2 days.

The business continuity strategy to avert such a system failure

In order to ensure that operations continue in our organization, there is a need for a third party maintenance and support agreement to be signed with a reliable company. There is also a need to have an emergency third-party support agreement that involves an on-site response within the shortest time possible. There is also a need for our business to have redundant servers on standby.….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Risk And Vulnerability Analysis" (2012, May 07) Retrieved June 26, 2025, from
https://www.aceyourpaper.com/essays/risk-vulnerability-analysis-57207

Latest MLA Format (8th edition)

Copy Reference
"Risk And Vulnerability Analysis" 07 May 2012. Web.26 June. 2025. <
https://www.aceyourpaper.com/essays/risk-vulnerability-analysis-57207>

Latest Chicago Format (16th edition)

Copy Reference
"Risk And Vulnerability Analysis", 07 May 2012, Accessed.26 June. 2025,
https://www.aceyourpaper.com/essays/risk-vulnerability-analysis-57207