Advanced Audititing and Assuarence
Advanced Audititing and Assuarence
Advanced Audititing and Assuarence
Areas of risk in relation to a computer system include but are not limited to; hardware and
software failure, malware, natural disasters, and human error.
Computer hardware is the physical part of a computer system such as the keyboard, mouse,
monitor, and CPU among others. Computer software is the programs and applications that
allow a user to carry out functions on a computer. Computer hardware and software risk
could be due to factors like dust accumulation, users' negligence/poor handling, virus attacks,
and power surges. A power surge is when a significantly more voltage comes through wires
into a devise. This can be due to an overloaded circuit. A power surge can knock out a whole
computer system reducing it to ashes which is a great loss to an organization. Data can be lost
as well the computer system itself which maybe too expensive to re-establish.
Natural disasters are also another area of computer security risk. These include floods,
thunderstorms, and fires. Thunderstorms are rain bearing clouds that also produce lightning.
Lightning carries a huge amount of energy that can damage the delicate parts of a computer
like the CPU. According to Mark Hubbard as cited by Lerbinger, O. (2012), this kind of
catastrophes can set the stage for cyber-attacks because they leave people and organizations
vulnerable. Threat actors use such opportunities to launch well timed attacks. They can
prevent fast responders, utilities, or government agencies from mobilizing after the disaster,
creating a domino effect of mystery.
Lastly, human error which may be due to weak password practices and clicking into
malicious links is also a security concern. It can also be poor handling of data or use of
insecure software. A password is an access control measure for computer users. A good
password should contain at least 12 characters which should be a combination of uppercase
letters lower case letters, numbers and symbols, significantly different from previous
passwords and something not searchable from the dictionary, which should be changed at
least every three months and not shared with unauthorize persons. If passwords are
mishandled, anyone can access them hence gain access to the computers and resources in it
which can be grievous to the organization. Beynon-Davies, P. (1999).
Suitable controls should therefore be put in place to safeguard computer systems against
these risks. Some of the controls could be;
1. technical controls.
Such as user authentication, at log in to assure internal access on a need-to-know
basis.
2. Detective controls
They act as guardians, alerting you of the potential intrusions into your computer
systems. By detecting and responding to threats in advance, you can limit the extent
of damage and protect your valuable assets.
3. Corrective controls
They aim at preventing previous attacks from re-occurring. These may include
employing robust backup mechanisms which can help you restore your data even
when it is lost, hence reducing downtime and restoring normal operations.
4. Physical controls
Such as employing a security guard to watch over the premises where computer
systems are stored and prevent unauthorized persons from accessing it.
5. Compliance controls
This means adherence to privacy laws, cybersecurity framework, and standards
designed to reduce cybersecurity risks.
6. Cyber access
Such as use of up-to-date firewalls, password policies, and software applications that
alert you when there are risks such as ransomware attacks and phishing.
REFERNCES
Lerbinger, O. (2012). The crisis manager: Facing disasters, conflicts, and failures.
Routledge.
Beynon-Davies, P. (1999). Human error and information systems failure: the case of
the London ambulance service computer-aided despatch system project. Interacting
with computers, 11(6), 699-720.
Tanimoto, S., Hiramoto, M., Iwashita, M., Sato, H., & Kanai, A. (2011, May). Risk
management on the security problem in cloud computing. In 2011 First ACIS/JNU
International Conference on Computers, Networks, Systems and Industrial
Engineering (pp. 147-152). IEEE.