Abstract

As modern business and financial institutions have come to rely more and more on large scale computers for management support, the magnitude of the risks and their potential consequences has increased correspondingly. In addition, large systems involving multiprocessing, resource sharing, and distributed processing have given rise to a new generation of risks due to the increased vulnerabilities of such large scale systems and the potential for fraudulent or malicious misuse of their resources. Somehow, these risks must be managed since either deliberate or accidental impairment of these large scale systems can have serious consequences for the business. That is, threats must be identified, and the likelihood of their occurrences and the elements of the system vulnerable to each of these threats must be established. Any program for risk management must begin with a risk analysis to compare the vulnerabilities in order to pinpoint and rank the system's weaknesses and to provide a guide for the cost-effective, systematic reduction of the probability of the system's being subverted or otherwise impaired.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.