Richard's Video Maze: Assessing The Risk And Threat: [Essay Example], 879 words GradesFixer

Haven't found the right essay?

Get an expert to write your essay!


Professional writers and researchers


Sources and citation are provided


3 hour delivery

This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Richard's Video Maze: Assessing The Risk And Threat

Download Print

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

Download PDF

A threat and risk assessment of the owner of Video Maze takes into consideration that every customer’s security needs are unique. The Video Maze and its regulatory requirements, its specific threats, budget, existing information technology, business environment, and the risk of tolerance all contribute to the kind of solutions that are unique to the business. In Richard’s Video Maze, determining and implementing optimal protection solution that meets the business needs relies on a threat and risk assessment, which concentrates on defining whether or not the business system is secure, whether or not Richard is responsible for the security of his customers’ data, weighing the responsibility of Richard towards his employees in the workplace, and if other inefficiencies that could be corrected exist in the business.

There is the need to know about the strength of security behind the Video Maze. Apart from the creation of a strong username and password, there may be the need to have professional guidance in dealing with security threats. The owner of the Video Maze has ensured that his business has a technology expert, who provides his expertise on matters information technology. The technology expert has ensured that the hardware specifications as well as the software specifications are all working and secure.

However, there is suspicion on the behavior of some employees during business operations and occasionally during break time. An employee whose name is Brad has been noted to be never sharing his internet search information with others. He is also noted to be behaving suspiciously when someone uses his computer. Brad is, therefore, noted as a security threat to the Video Maze system. Coincidentally, some customers have complained about slow internet when accessing the Maze Web page. Kris is also reported to have ignored an email from a friend in the industry, which had included an attachment about server disaster guidelines, a factor that could compromise the entire system.

Negligence of the professional technology expert should call for the hiring of another expert, whose actions may not cost the entire system. Suspicious behavior of an employee and the slow Maze Web page called for an audit of the servers of the system to check if the security of the business has been compromised. Richard’s action to call for the security audit would most likely achieve the required threat and risk assessment document from the local Information technology competent university students.

Information technology security risk has often been seen as a function of threat, vulnerability, and assets value. Various measures such as countermeasures can be put in place to reduce the security risks. The countermeasures should be structured such that the probability for a threat to become true is reduced. The measures can also reduce vulnerability as well as reduce the impact caused when a threat comes true (Last, 2001).

The countermeasures in Richard’s Video Maze include the backup server, which could be used in case the entire system was compromised and the frequent upgrade of the system to the modern technology. With the security audit in place and the countermeasures checked regularly, the company system is scalable to have room for another company at a separate location, which Richard had thought of. In case the system would be compromised, the online backup would be essential in retrieving customer information and other useful data for the business.

In Richard’s case, risk can be termed as a function of asset value, threat, and vulnerability. The risks that would still exist even after applying countermeasures would have to be considered by the management and be accepted or rejected by the employees. The risk factor is illustrated as in the figure below (ENISA, 2006, P. 10).

Asset Value Risk Countermeasures

Threat Residual Risk Vulnerability

In spite of the fact that Richards’ customers have their usernames and passwords; Richard is responsible for the security of their information. Research indicates that apart from having strong security details of online accounts, the security of such accounts is to be monitored by the real owners of the business. In the contemporary world, institutions such as banks maximize the security of their customers’ information by seeking expertise guidance from the relevant technology experts and bodies in charge of financial organizations. It is also the responsibility of the customer to ensure the security of their online content. Even as institutions strive to guarantee the security of their online systems, it is significant for the customers of the institutions to understand the threats revolving around computer systems. Moreover, customers have the responsibility to keep their devices secure by installing software such as anti-virus, which would prevent malicious activity from their online network.

Richard is held responsible for the actions of his employees at the workplace as he should have identified the strange behavior from the employees as a threat to the security of his Video Maze. As the business owner, it is expected of Richard to limit the degree of confidentiality among his employees and know the impact of disclosing data to his employees. The phases of risk assessment in information technology require that the enterprise can still identify information that has been disclosed to other parties as such risks have major business impacts for the company (ENISA, 2006, P.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism free

Sources and citations are provided

Cite this Essay

To export a reference to this article please select a referencing style below:

GradesFixer. (2019). Richard’s Video Maze: Assessing The Risk And Threat. Retrived from
GradesFixer. "Richard’s Video Maze: Assessing The Risk And Threat." GradesFixer, 12 Mar. 2019,
GradesFixer, 2019. Richard’s Video Maze: Assessing The Risk And Threat. [online] Available at: <> [Accessed 10 August 2020].
GradesFixer. Richard’s Video Maze: Assessing The Risk And Threat [Internet]. GradesFixer; 2019 [cited 2019 March 12]. Available from:
copy to clipboard

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.


    Attention! this essay is not unique. You can get 100% plagiarism FREE essay in 30sec

    Recieve 100% plagiarism-Free paper just for 4.99$ on email
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample

    Sorry, we cannot unicalize this essay. You can order Unique paper and our professionals Rewrite it for you



    Your essay sample has been sent.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer uses cookies. By continuing we’ll assume you board with our cookie policy.