Risk Assessment Software Applications Research Paper by Professor Victor Verb

Risk Assessment Software Applications
An analysis of the effectiveness of risk assessment software applications in the workplace.
# 49268 | 11,473 words | 10 sources | MLA | 2004 | US


$19.95 Buy and instantly download this paper now

Description:

The risk assessment process is becoming increasingly important, but it has assumed enormously complex dimensions at the same time. Risk assessment has reached a new level of importance in the Information Age. The growth of sophisticated networked information systems and distributed computing has created a potentially dangerous environment for private and public organizations. This paper examines these issues and provides an analysis of popular risk assessment applications. An original comparison table is provided.

Chapter One: Introduction
Statement of Hypothesis, Research Problem, or Statement of the Purpose
Outline of Thesis/Project
Chapter Two: Methodology/Layout or Reason
Chapter Three: Literature Review
Industrial Settings and Software
Business Credit Settings and Software
Primary Software
Secondary Software
Risk Assessment Software for Credit Applications
Accounts Receivable Processing (ARP) Company
Advisa, Inc.
C/LECT Consulting, Inc.
Competix
Credit & Management Systems, Inc.
Dun & Bradstreet
eCredible, Ltd.
eCredit.com
Experian
GETPAID Corporation
I-many, Inc. (formerly ChiCor, Inc.)
Magnum Communications, Ltd.
9ci, Inc.
NMC Technologies, Inc.
Risk Assessment in Financial Institutions
Selected Banking Risk Management Software
Chapter Four: Pros and Cons
Chapter Five: Findings
Establish the Context
Identify Situations that Have Risk Implications
Analyze and Assess Risk
Design Response Strategies
Implement and Integrate
Measure, Monitor and Report
Chapter Six: Conclusion and Recommendations
Works Cited

From the Paper:

"Risk assessment has reached a new level of importance in the Information Age. The growth of sophisticated networked information systems and distributed computing has created a potentially dangerous environment for private and public organizations. "Critical data -- such as from trade secrets, proprietary information, troop movements, sensitive medical records and financial transactions -- flows through these systems"(Hammond 1999:69). Consequently, organizations are becoming increasingly concerned with potential exposure and are looking for ways to evaluate their organization's security profile today. Risk assessment software applications systems allow researchers, managers and others to perform "what if" analysis of the value of their information and various threats and vulnerabilities. For instance, risk assessment software systems such as NetSolar by Cisco, use both passive analysis and active probing methods to identify security vulnerabilities, which may increase the efficiency of vulnerability identification and reduce false-positive results. Hamilton reports that these technical assessments can differentiate between infrastructure devices (routers, switches, or firewalls) and host devices (user workstations or servers such as e-mail servers and Web servers). "Technical vulnerability tools can find vulnerabilities in network TCP/IP hosts, UNIX hosts, Windows NT hosts, Web servers, mail servers, FTP servers, firewalls, routers and switches" (Hamilton 1999:69)."

Cite this Research Paper:

APA Format

Risk Assessment Software Applications (2004, February 29) Retrieved July 05, 2022, from https://www.academon.com/research-paper/risk-assessment-software-applications-49268/

MLA Format

"Risk Assessment Software Applications" 29 February 2004. Web. 05 July. 2022. <https://www.academon.com/research-paper/risk-assessment-software-applications-49268/>

Comments