Computers and other digital devices have become very crucial in businesses and e-commerce. For instance, nowadays every organization and individuals use computers to store their data. Computers are capable of storing bulk sensitive and personal data. Due to this, computers have triggers insecurity where attackers try to hack data from organizations. For businesses to use computers to store their sensitive data, they must ensure security is practiced. The digital devices must be configured such that all communications should be secured. Therefore, to protect information, access to information in an organization should be restricted to specific users only. This means that confidentiality should be adept. There must control put in place to ensure security has prevailed. Security is an evolutionary process which advances daily. Attackers are on the forehead to invent new techniques for attacking information (Lee, Yim, &Seong, 2018). In some cases, those controls can fail to be implemented. In this essay, we will discuss situations when some of the controls which cannot be implemented in a computer.
In the case of introducing a new application to the market, anti-malware defenses can be inactivated to test the software. Anti-malware software prevents the installation of software from unknown sources. When anti-malware is installed on a computer, it scrutinizes all the new applications to be installed. , and automatically it will be blocked from installation. Thus, to install the new application, the rules must be broken. Therefore, privileges should be made to the application to test its performance. Not implementing this control will not cause a threat to an organization since the operation will be an internal case. Inventory of authorized and unauthorized hardware and software can be overlooked in the same case. A new application can also assume the privileges of administrators. This will imply that there will be no boundaries set among the workers in an organization. Introduction of a new member in an organization will mean that some controls will not be implemented to give new member humble time to learn processes step by step. In the case of government supervision, controls will not be implemented as usual. The government will do a snap check all activities done in a firm. In the case when the government suspects malicious activities by a company, it will force even the administrators to give out their privileges to the government representatives. The government representatives can access the credentials of the system used to in a firm. Another scenario when controls can fail to be implemented is when an employee is suspected of doing some unethical activities in the business. The privileges of the worker will be upheld in the process and system check against the claims.
In the case of introducing a new application in the organization, sensitive should be backed up in a different database to prevent corruption in the process of installing. Failing to back up data may put the organization at risk of losing data in case the new software cracks in the process. The new software can also be denied some privileges to prevent it from interfering with the current data stored. Boundaries should be put in place to ensure that the new application has a restricted radius of access. Government officials may interfere with the data of an organization. Back up of data is the best way to deal with this case. Some representatives may have unethical characters and will reveal the system operation of a firm to its competitors or other attackers. This will put the business at risk. Authentication of data can be of great use in this case where only the firm users can access the system (Rohde, 2019). To prevent any misconduct in a firm, snap checks should be conducted on a daily basis to evaluate each member’s daily activities.
Compensating the controls ensure the on-compliant system continues to operate within the secured and compliant environment. Such is because the controls are considered as usual after the compensation. The authentication scheme ensures that data is secured in a firm. Compensation of controls implies that failing to implement the security controls does not affect the security details of a firm. The controls not implemented will not interfere with the current operation of a firm using the compensation mechanisms. This will ensure that the security of the business will be as usual.
Cybersecurity is an emerging topic in an organization due to the rise of attackers in the market. Organizations need to protect their data from those intruders. Failure to this will lead to operational risk. In the compliant environment arises cybersecurity breach on various occasions. Employees can become a spy of the firm operations outsourcing its information to the attackers. This can be a threat since it is difficult to identify a spy employee in a company. Employees must be trained on the cybersecurity issues to understand the threats, risks, and vulnerability that can be caused to the firm.
Rohde, K. W. (2019). Cyber Security of DC Fast Charging: Potential Impacts on the Electric Grid (No. INL/CON-18-52242-Rev000). Idaho National Lab. (INL), Idaho Falls, ID (United States).
Lee, C., Yim, H. B., & Seong, P. H. (2018). Development of a quantitative method for evaluating the efficacy of cyber security controls in NPPs based on intrusion tolerant concept. Annals of Nuclear Energy, 112, 646-654.