This action might not be possible to undo. Are you sure you want to continue?
1. Threats to company technology and infrastructure are always a constant risk that calls for companies to be prepared to combat the attacks that may arise. Companies should devote a large percentage of their money to protect their technology assets. The thing to keep in mind is that no matter how much money you spend on network security, you will never have a 100 percent secure network. The decision that a company has to make would be an unstructured decision. It would not be considered a structured problem/decision because there is no single set of steps that are known. Attacks on the network are never the same known sequence so there would be no way to configure an algorithm to address each individual attack. 2. The security risks that a company faces can be addressed by various forms of controls, such as access controls, and through security measures. Controls are constraints and other restrictions imposed on a user or a system and they can be used to secure systems against the risks. Through the proper use of controls, a company can limit the level of attack breaches to reduce damage caused to systems. Some forms of security measures that can be used to protect a company’s against security risks are; using firewalls, authentication and encryption, digital signatures, and digital certificates. 3. A company’s assets must be protected from various threats. The most serious threats are actually hardware failure, which causes the most system downtime that could end up costing the company immense loss of revenue, such as Amazon.com going down and not being able to sell products. Hardware failure can also lead to data loss if a company has not implemented a robust backup system, such as using a RAID (Redundant Array of Independent Disks) setup. The second most serious threat is from malicious hackers, who strive to steal information, destroy and alter data, deface websites, and also installing and infecting computers with viruses and worms. Both of
these threats cause much damage to a company’s technology assets and the most serious threats are those that affect company data.