Friday, November 13, 2015

Six Future Risks to Information Security

A risk is likely to harm that may arise the current process or from the future occurrence. In this, future risk is the likely harm that may arise from the future occurrence (Zissis & Lekkas, 2012). The following are the six future risks to information security.
Emergence:
Emergence may include natural calamity that is the act of nature which is beyond human control, for example, earthquakes, volcanoes, floods, landslides and many more. Any of these risks could lead to total or partial damage to information security.
Human factors:
This is the release of sensitive or confidential information to an unauthorized person. Accidental disclosure may also arise from the process of hacking, password cracking, tunneling, malware, spyware, viruses, worms and many others (Vacca, 2012).
Culture:
The above named may cause future risk to information security through various ways like exposing trade secrets, exposing strategy and new products to competitors, bad or false publicity, and many others. This may be caused by social interaction of people in a certain environment
Through social interaction, the following may occur, intellectual property theft, copyright infringement, illegal infiltration, competitive research, price surveillance and many more.

Governing:
The above may pose a risk to information security through some of the ways like, acts of war, biological welfare, chemical welfare, electrical welfare that include physical disruption or intentional interference, terrorism, cyber warfare, just to name but a few.
The enabling and supporting factor:
These are people who have all information pertaining a certain information system and who are likely to cause intentional alteration of data, tampering, sabotage, vandalism, fraud, scandals and many others.
Architecture:
This is the general design of the organization. The design gives the interconnection of activities and operations of an organization. The design of the organization structure may determine the security of the information through the determination of how the information will flow in the organization.
How they will affect individuals and organizations
The risks mentioned earlier may negatively affect individuals and organizations involved through some ways. Among them is disclosing individuals’ or organizations’ sensitive information that may pose danger to the affected, it may also create unhealthy business competition to the people involved and can also lead to losses or closure of ones or organizations’ business activities and, in general, it may negatively affect the performance of business.

References:
1.      Vacca, J. R. (2012). Computer and information security handbook. Newnes.

2.      Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems.

No comments:

Post a Comment