Introduction
At jubilee company which is an insurance company located in Africa, a malware got into the company's database system, which led to a loss of all of the company's information. This can be defined as the threat as it was an accidental happening which led to the loss of the company's data. The damage was as a result of an employee from the company who deliberately administered the malware to the organization's database systems using a flash disk as he had a lousy reputation character which had been recorded in the organization's operations. This is what is referred to as the source of the threat and because it was a loss which was caused by an employee deliberately.
We, therefore, regard this as an adversarial threat as it was intentionally caused by this individual.
When the malware was administered, the company's data which is so crucial to the company got damaged and lost and restoring it has been a significant issue. In this case, the company's data is the vulnerability point as it is the point that was so much crucial to the company's data, this was the point of target that led to this loss we, therefore, term it as the point of vulnerability which could be exploited.
The malware successfully got hold of the company's data because there were no anti-viruss systems which would have protected the data against attack by the malware, it is because of this that the threat was successful and was able to damage the data in the database system, which led to 60% loss of data of the company (Mass.gov, 2019).
To be able to asses the occurrence and the degree of the damage it can cause I would hire database technology experts to ensure that the data is well protected and also insurance experts to ensure that they have assessed the possible reasons that could lead to the occurrence of the risk..
The other type incident was a loss of still the same company, and jubilee company was as a result of a work premise which collapsed because of floods which occurred, leading to total damage of the building. The collapse of the building is what is referred to as a threat. This loss happened as a result of floods which is a natural calamity and therefore since the damage was not deliberate, this loss is consequently referred to as non- adversarial loss (Mass.gov, 2019). The premise was the vulnerability point as it was where the organization activities of day- to- day activities were being carried out. However, in the view of the fact of the poor quality of the foundation of the building as it has been constructed is what led to the collapse of the building because of this, the threat, therefore, is thriving as the foundation is weak and we can, therefore, say that the threat source was successful.
The whole building collapsed, which led to the total loss of all assets that the company owned, and therefore we say that the threat source was successful leading to 100% loss of assets of the company.
To be able to asses the loss I would hire construction experts to ensure that they prescribe good measures regarding how the premise ought to be, I would as well hire insurance experts to state the actual loss and prescribe measures as well.
References
Greene, S. (2019). References | Security Program and Policies: Governance and Risk Management | Pearson IT Certification. [online] Pearsonitcertification.com. Available at: http://www.pearsonitcertification.com/articles/article.aspx?p=2192704&seqNum=5 [Accessed 28 Sep. 2019].
Law and History Review. Vol. 1, No. 1, Winter 1983-. Cornell Law School and the American Society of Legal History. Cornell Law School, Myron Taylor Hall, Ithaca, N.Y. 14853. (2x/year-$30 U.S. and Canada, $40 Europe). (1983). International Journal of Legal Information, 11(1-2), pp.25-25.
Cite this page
Essay Sample on Jubilee Company's Unfortunate Data Loss Due to Malware Attack. (2023, Feb 12). Retrieved from https://proessays.net/essays/essay-sample-on-jubilee-companys-unfortunate-data-loss-due-to-malware-attack
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Mobile Cloud Systems and Services Annotated Bibliography
- Essay Sample on Security Auditing Key Concepts and Methods
- Network Components - Essay Sample
- People Addicted to the Internet - Essay Sample
- Essay Sample on FIN6
- Software Tracking Data: From Tapes to Cookies - Research Paper
- Essay Example on Digital Hacking: Growing Threats in the 21st Century