- 01/03/2013
- Posted by: essay
- Category: Free essays
Today, the risk management plays an important part in modern organizations. In this respect, the development of information technologies and Internet contributes to the increase of the number of potential threats organizations can face, while developing their websites and extending their operations online. In such a situation, the emergence of risks of information breaches and identity theft raises the problem of the effective risk management. In actuality, it is hardly possible to underestimate the significance of the risk of information breaches and identity theft because this risk can lead to the loss of important data that can affect the professional or personal life of an individual, as well as functioning of the entire organization. Therefore, the risk management is essential for prevention and minimization of the risk of identity theft and information breaches.
The problem of information breaches is closely intertwined with the problem of identity theft. The problem of identity theft is very dangerous today, especially in the context of the wider use of online services by people and their growing concerns with the safety of their private information. In fact, information breaches can lead to the identity theft, when the private information of users is stolen away via Internet. Obviously, the protection of the private information of users should be the primary concern of the management system.
It proves beyond a doubt that, in order to prevent the problem of identity theft, it is necessary to focus the efforts on the process and technology of identification of users. The efficient system of identification of users can ensure that an unauthorized access to the private information of users will be impossible. At any rate, the efficient identification system can minimize such a threat.
In actuality, the management system uses finger scanning to identify its users. At first glance, this system of identification seems to be reliable and safe. In actuality, the use of finger scanning can be considered an efficient identification system because fingerprints of each individual are unique and the probability of the coincidence of fingerprints is practically impossible. Therefore, the use of finger scanning is oriented on the use of information that is unique and belongs to each specific user. At this point, it should be said that finger scanning grows more and more popular in the contemporary organizations because this identification system is considered to be reliable.
However, many specialists (Thames and Webster, 2009) warn that the use of finger scanning is accompanied by potential problems, which the risk management should take into consideration, while developing an efficient information system which can secure the access to the private information of users. First of all, it should be said that the finger scanning is not absolutely perfect and it does not necessarily mean that this system of identification cannot be overcome in a way. In actuality, there are different ways which allow overcoming the finger scanning system. In fact, what one needs to deceive the finger scanning system is to get fingerprints of the target user. At first glance, it seems to be impossible to use fingerprints of a person without making him or her knowing about the use of his or her biometric data, i.e. fingerprints. However, it is very simple to get fingerprints. To meet this goal, one needs to take a glass or any object where fingerprints can be taken from. As soon as a potential offender has got fingerprints of its victim, he or she can use these fingerprints to get identified by the finger scanning system. For instance, it is possible to use a film or material which fingerprints can be printed on and use it instead of a finger of the real user.
At the same time, the use of various identification systems is accompanied by the risk of the failure of the functioning of expensive systems that are introduced within the organization. Many specialists (Schein, 1999) warn that the fingerprint identification is imperfect and not reliable because it is possible to cheat the system out. As a result, individual who manage to pass through the fingerprint identification system can get access to restricted areas and information which was supposed to be protected by the fingerprint identification system.
At the same time, information breaches and identity theft can occur online and offenders do not even need to penetrate into a restricted area. Instead, they can use ITs and modern telecommunication systems to get access to private or secret information. In such a situation, it is important to develop effective information systems that can protect organizations from information breaches and unauthorized access to private information that lead to the identity theft.
Thus, it proves beyond a doubt that the problem of identity theft and information breaches is one of the most serious problems many modern organizations are facing. However, there is no perfect solution to this problem. Therefore, organizations should work constantly on the improvement of their identification systems and information systems.
References
Schein, E. H. (1999). Organizational culture and leadership. San Francisco: Jossey-Bass.
Thames, B. and D.W. Webster. (2009). Chasing Change. New York: John Wiley and Sons.
Leave a Reply
You must be logged in to post a comment.
