Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Prepare a 6-10 slide narrated PowerPoint presentation that identifies the possib

ID: 3673482 • Letter: P

Question

Prepare a 6-10 slide narrated PowerPoint presentation that identifies the possible risks to an organization in each of the following outsourcing situations: The use of an external service provider for your data storage. The use of an enterprise service provider for processing information systems applications such as a payroll, human resources, or sales order taking. The use of a vendor to support your desktop computers. The use of a vendor to provide network support. The presentation will include a risk mitigation strategy for each situation. One mitigation strategy, because of personnel and facility limitations, cannot be proposed, because it eliminates the outsourcing by bringing the situation in house.

Explanation / Answer

Risks related to the use of an external service provider are:

1.The storage location of the data may be unknown as the data might be flowing through various streams.

2.Privacy of data may be compromised as data might be send and may not be recieved by the computer and someone in the middle might gain access to it.

3.The provider may go bust and the information transfer may stop in a second.

4.Access to information may not be authorised as data maybe accessed by intruders.

The best way to mitigate this probelm is to install intrusion detection systems and also make sure the external service provider must be known along with the data being exchanged with the person:

Risks related to use of an enterprise service provider are:

1.Transaction risk:The transactions may be processed by the enterprise thorugh various credit cards and banking.As a result the external enterprise might get data related to banking details which might be misused and data may be accessed by thrid parties in this scenario.This can lead to unknown people getting into the data being exchanged.

2.Confidentiality risk:Inknown users may access private information.

3.The business continuity may not be maintained if the provider disappears all of a sudden.

The best way is to make sure the provider accessed all the informaiton properly and transactions are authenticated through SSL making sure its done with one time password and only genuine users can access information.