Open Always
Email: support@globalcompose.com Call Now! +1-315 515-4588
Open Always
Email: support@globalcompose.com Call Now! +1-315 515-4588

Sample Business Plan Paper on Vulnerabilities Assessment

This sample paper on (Sample Business Plan Paper on Vulnerabilities Assessment) was uploaded by one our contributors and does not necessarily reflect how our professionals write our papers. If you would like this paper removed from our website, please contact us via our Contact Us Page.

A Database of over Million Scholarly Resources. Start your Search Now

Sample Business Plan Paper on Vulnerabilities Assessment

The Assessment of risk factors that may attribute to the occurrence of unwarranted actions presents some challenges to security officers. My selected organization is International Business Machines Corporation (IBM) that deals with the production and sale of computer hardware and software. Security official at IBM engages in an intensive process of determining the risks associated with information, natural, human-made and technological threats. This ensures that the organization make formidable plans to counteract these threats. Uncontrolled threats or lack of good plans exposes an organization to losses of data and critical information that may be used by competitors to their advantage. There are many methods that an organization can use in the determination of risk. However, it must ensure that the method applied align to the goals and vision of the company. Therefore, the essay discusses how security officials at IBM determine vulnerabilities to natural, human-made, and technological threats.

In this section, the essay expounds on vulnerabilities affiliated to different risks such as technology and natural threats. In addition, different methods will be discussed into details to ascertain the best alternative Vulnerability plan to be utilized by an information and technology organization. Vulnerabilities can be defined as an occasion/situation that exposes an organization/ individual to loss or danger. This means that an individual is more likely to incur losses if proper measures are not put into place to reduce the risk exposure.

Information, Technological, Natural and Human- Made Threats

First, information is an important tool for an IT business. The information systems prevalent in the organization are not free from leakages. Hackers may get critical information that they will use for their own benefits. Some employees may engage in uncouth behaviors by trading critical data with the organization competitors in returns for financial benefits. These actions put the organization at a disadvantaged state because their rivals will implement destructive strategies that will see the organization lose its market share. To determine whether the organization is losing its secretive data to unauthorized persons,  the security personnel’s will install firewalls and security features on various websites to help monitor employees activities (White, 2014). By doing this, the organization will be in a position to block some of the loopholes. Technological threat on the other hand denotes the Introduction of new systems for data storage and communication purposes. The International business machines applies cloud computing in sharing data as well as in the communication between different departments. It lowers the cost of administration as well as maintenance of expensive systems that were previously used by the firm. However, this system is susceptible to hacking and misuse by people entrusted to oversee its operation (White, 2014).

The plan is as follows:                                                                                       

Figure1: The figure above represents risk assessment.
From the figure above, vulnerability assessment takes a process. This process involves planning, evaluating, making decision and taking the necessary steps.

Therefore, establishing the loopholes requires that the organization/management come up with policies that guide users while applying internet. This insinuates that users will behave and act in a responsible manner. Human made- made treats emanates from the manner in which employees behave in regards to information resources. Therefore, the code of conduct needs to be stringent enough to discourage unethical behaviors by employees. In addition, negligence also contributes a lot to data loss or leakages. Disciplinary measures should be introduced and strengthened to discourage irresponsibility amongst employees. Natural threats come from the environment where the organization is operating in or the threats affiliated to a particular business. Businesses dealing with information systems and technology are more likely to suffer attacks by hackers than any other type of business.  

Personnel and Work Behaviors

Work ethic is an aspect of organizational success when put into the right use. IBM cannot afford to lose money or revenues through unwarranted behavioral attributes by its workers. This type of treat can be detected through signs such as misusing the company resources, engaging in shoddy deals and reduction in productivity levels. These activities deny the organization its precious time and resources that could otherwise have been utilized productively.  In an effort to curb the menace, the organization should develop a well structured plan and schedule that outlines employee’s duties. Those employees who do not follow the set rules will have to be punished through various disciplinary measures developed by the entity.

Transportation Vulnerabilities

Transportation presents the biggest challenges for the multinational corporation. This is because some goods on transits have fallen into the wrong hands such as bandits and thieves. This prompted the organization to earmark some of the regions in the world as hostile. The reason behind this is that several cases of robbery have been registered in these places. To an extreme end, IBM has decided to withdraw its operations from a country such as India. The move affects the firm and its brands sold all over the world.  In addition, the natural weathers causes delay during transportation in undeveloped areas. Furthermore, breakages of hardware goods may take place an action that results to losses for the entity.  

Socio-Economic and Criminal Activity Factors

Social-economic factors are concerned with the branding, selling and marketing of computers products. A lot of funds are used in promoting the brands in the market. Some communities have not embraced the new way of life where computers and technology forms the norms and are applied on daily basis. Therefore, selling or marketing technological devices to such a community is a waste of time and resource. The same situation has ever happened to IBM and it had to withdraw its services in some markets for lack of potential clients. Detecting these activities goes hand in hand with the carrying out of market research (Derr, 2016).

Moreover, highly developed markets are hard to penetrate especially when marketing a new brand of products. However, IBM has been able to overcome this challenges due to its many years in operation in providing services for both hardware and software devices. Rival companies have intensified their marketing techniques/strategies to gain market-leadership. IBM on its side has not been doing well in this area an action that puts its services in jeopardy.  It has lost a good percentage of its market share to other companies who engage in customer focused services when offering designated services.

Criminal activities are unpreventable if they emanate from the external environment. However, IBM has introduced some strategies such as installation of security systems to monitor people movements in and out of their premises. This facilitates their monitoring and supervision activities hence reduce crime by a great deal. Crime is not only a problem to businesses but also to the government which looses income inform of revenues when firms ceases to function. Loosing property to burglary forces the organization to reschedule its operation and manufacturing procedures to cater for the change of events. Crime is also reduced through employees training endeavor. It makes sure that they perform their duties using the right procedure.

Neighboring Businesses

Venerability associated to the presence of substitute goods includes lowered prices of goods produced, competition for resources and increased cost of operation. Businesses scramble for the scarce resources so as to maximize on profits. This leaves many organizations at a crossroad unable to find the best alternative action to undertake. Companies located within a particular region compete for labor forces. Due to the rising demand for workers, labor becomes an expensive aspect of production. Some organizations entice competitor’s employees with money and good salaries so as to resign. They will then employ them and use their knowledge about their neighbors/rivals to launch programs that will see competition move to a higher level.

In conclusion, IBM has served in the technology business for over fifty years. These years have been a learning journey for the organization in terms of market demand and supply. The taste and preferences for electronic products is dynamic and changes from time to time. This means that the company has to come up with new ways of doing things or new brands to maintain its market share. To be able to do this, venerability assessment is carried out for each risk. It helps ascertain the extent to which risk can affect an organization or halt its operations. Therefore, engaging in risk assessment is not an option for a technological firm. This is because of the nature of business and the environment to which the company operates. IBM has faced competition from companies such as Microsoft and Apple. However, its hardware products still dominate the market especially for the middle income earners.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Derr, R. (2016). Vulnerabilities. Threat Assessment and Risk Analysis12(4), 

White, J. M. (2014). Workplace Violence Risks and Vulnerabilities. Security Risk Assessment,22(3), 

 

Sharing is: CARING

Are you looking for homework writing help? Click on Order Now button below to Submit your assignment details.

Homework Writing Help
We Can Help you with this Assignment right now!
Sample Business Plan Paper on Vulnerabilities Assessment

Are you looking for homework writing help on (Sample Business Plan Paper on Vulnerabilities Assessment)?Well, you can either use the sample paper provided to write your paper or you could contact us today for an original paper. If you are looking for an assignment to submit, then click on ORDER NOW button or contact us today. Our Professional Writers will be glad to write your paper from scratch.

 

 

We ensure that assignment instructions are followed, the paper is written from scratch. If you are not satisfied by our service, you can either request for refund or unlimited revisions for your order at absolutely no extra pay. Once the writer has completed your paper, the editors check your paper for any grammar/formatting/plagiarism mistakes, then the final paper is sent to your email.

Privacy| Confidentiality

Sample Business Plan Paper on Vulnerabilities Assessment

We do not share your personal information with any company or person. We have also ensured that the ordering process is secure; you can check the security feature in the browser. For confidentiality purposes, all papers are sent to your personal email. If you have any questions, contact us any time via email, live chat or our phone number.

Our Clients Testimonials

  • I appreciate help on the assignment. It was hard for me but am good to go now

    Impact of pollution on Environment
  • Am happy now having completed the very difficult assignment

    Creative Message Strategies
  • Your writer did a fine job on the revisions. The paper is now ok

    Ethics: Theory and Practice
  • The paper was so involving but am happy it is done. Will reach you with more assignments

    Title: Privatization in or of America
  • I expected perfection in terms of grammar and I am happy. Lecturer is always on our head but was pleased with my paper. Once again, thanks a lot

    Title: Bundaberg Inquiry
  • The paper looks perfect now, thank to the writer

    Health Care Systems
  • You helped me complete several other tasks as you handled paper. wonna thank you

    Critique Paper on Political Change

Related Articles

Sample Business Plan Paper on Vulnerabilities Assessment

Cultural and Ethnic Studies Assignment on What makes a successful video game today

Cultural and Ethnic Studies Assignment on What makes a successful video game today
Read More

Cultural and Ethnic Studies Assignment on What makes a successful video game today

Cultural and Ethnic Studies Assignment on What makes a successful video game today
Read More

Economics Assignment on Initial Proposal for Research Area for Literature Review

Economics Assignment on Initial Proposal for Research Area for Literature Review
Read More

International Relations Assignment on modern agriculture effect on the UAE’s economy

International Relations Assignment on modern agriculture effect on the UAE’s economy
Read More

Get more from us…

Would you like this sample paper to be sent to your email or would you like to receive weekly articles on how to write your assignments? You can simply send us your request on how to write your paper and we will email you a free guide within 24-36 hours. Kindly subscribe below!

Email Address: support@globalcompose.com