Application of Risk Management Steps

This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

18 December 2021

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

Get custom essay

75 writers online

Application of Risk Management

YieldMore is a small agricultural firm that produces and sells fertilizer products. The firm operates by way of its headquarters in a small city in Indiana. Outside its headquarters, there are two massive manufacturing facilities—one in Nebraska and one in Oklahoma. Furthermore, YieldMore employs sales force personnel in every state in the united states to serve its clients locally. The firm has three servers positioned at its headquarters—Active Directory Server, a Linux software server, and an Oracle database server.

The application server hosts YieldMore’s main software utility, which is proprietary program managing inventory, gross sales, supply-chain, and buyer information. The database server manages all information saved locally with direct hooked up storage. All three main websites use Ethernet cabled native space networks (LANs) to attach the users’ Windows Vista workstations via industry commonplace, managed switches. The remote manufacturing amenities connect with headquarters through routers T-1 (1.fifty four mbps telecomm circuit) LAN connections offered by an external Internet service providers (ISP) and share an Internet connection through a firewall at headquarters.

Individual gross sales personnel throughout the nation hook up with YieldMore’s network via virtual private network (VPN) software program by way of their individual Internet connections, typically in a house office. Task:

I would have to say the more than likely pairs of threat/vulnerability are location, gear failure, social engineering, Denial of Service (DOS), and Mal ware. These threats appear to be the most problematic for this company. The first one is location; the servers are all housed within the company headquarters where if a pure or artifical disaster would cripple the company’s infrastructure.

They need to distribute their servers to different areas. Another pair is gear failure; each server has its own specific perform that it handles and nothing else. It would assist mitigate a variety of the danger that might happen if each server handled their own problems. Social engineering is a problem as a result of it’s depending on the consumer which another person can hack the individual for data that could get access to the organizations system. DOS is an issue because the public techniques aren’t protected by firewalls and anti-virus program. This makes service availability a loss. The last drawback is malware which is caused by the dearth of anti-virus or out of date virus definitions. The impact of that is often the loss of server or information relying on what the virus was originally intended to do. There are six danger management steps you should use to guard your company:

1. Determining the aims of the organization,
2. Identifying exposures to loss
three. Measuring those same exposures,
four. Selecting alternatives,
5. Implementing an answer,
6. Monitoring the results.
I would counsel utilizing all six steps to insure that my firm is protected. The main objective of a company growth will decide its strategy for managing various risks. Identification and measurement of risks are comparatively straightforward concepts.

Cite this page

Application of Risk Management Steps. (18 December 2021). Retrieved from

"Application of Risk Management Steps" StudyScroll, 18 December 2021,

StudyScroll. (2021). Application of Risk Management Steps [Online]. Available at: [Accessed: 2 October, 2023]

"Application of Risk Management Steps" StudyScroll, Dec 18, 2021. Accessed Oct 2, 2023.

"Application of Risk Management Steps" StudyScroll, Dec 18, 2021.

"Application of Risk Management Steps" StudyScroll, 18-Dec-2021. [Online]. Available: [Accessed: 2-Oct-2023]

StudyScroll. (2021). Application of Risk Management Steps. [Online]. Available at: [Accessed: 2-Oct-2023]

Don't use plagiarized sources. Get your custom essay..

get custom paper

We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy.