Risk Assessment Analysis of Phishing Research Paper

Total Length: 741 words ( 2 double-spaced pages)

Total Sources: 3

Page 1 of 2

This means that you must train employees how to identify various forms of phishing. At the same time, you must implement some kind of security procedures that will place a restriction, on how personal information is distributed. For example, employees could be trained in spotting various kinds of fictitious emails. However, when they run across an email like that is requesting information, there would be a procedure where the company will call the customer at the telephone number on file. This is significant, because it will improve the vigilance of: employees involving various phishing related emails. If for some reason, one happens to go through, no information can be released until you contact the customer at the telephone number they provide. This will prevent phishing, by having an initial process for detecting vulnerabilities and having some kinds of checks / balances in place. (Goldman, 2009)

Once you have an effective procedure, you want to begin testing the underlying risks related to phishing.

Stuck Writing Your "Risk Assessment Analysis of Phishing" Research Paper?

This is where you would have a team of security consultants, who would test the staff for various vulnerabilities using the latest techniques / scams. Over the course of time, this will help to ensure that the staff understands the various techniques and it will help to identify any new kinds of vulnerabilities. At which point, the chances decrease, that any kind of sensitive information will be compromised due to phishing. (Goldman, 2009)

Clearly, any business that conducts a risk assessment using the above tactics will be able to adapt to the changes that are occurring in various phishing related scams. This is because the strategy involves: flexibility and constantly monitoring for vulnerabilities. When any kind of entity is engaged in these two preventive actions, the odds decrease dramatically that they will lose any kind of sensitive information. At which point, the organization can focus on serving customer, while protecting all information at the same time......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Risk Assessment Analysis Of Phishing" (2010, June 24) Retrieved June 29, 2024, from
https://www.aceyourpaper.com/essays/risk-assessment-analysis-phishing-10102

Latest MLA Format (8th edition)

Copy Reference
"Risk Assessment Analysis Of Phishing" 24 June 2010. Web.29 June. 2024. <
https://www.aceyourpaper.com/essays/risk-assessment-analysis-phishing-10102>

Latest Chicago Format (16th edition)

Copy Reference
"Risk Assessment Analysis Of Phishing", 24 June 2010, Accessed.29 June. 2024,
https://www.aceyourpaper.com/essays/risk-assessment-analysis-phishing-10102