In order to decrease the probability of operational risks and to enhance information security, it is
recommended that any information that users consider sensitive or vulnerable should be
encrypted. The passwords should be kept secured and user accounts should not be shared.
Authorized users should be responsible for the security of their passwords and accounts. User
For the sake of maintaining privacy and confidentiality, installing desktop sharing tools and
software on any of the company resources should not be allowed. Only necessary and licensed
software and applications should be installed on the machines. Unwanted and unauthorized
software should be removed from the machine. The user should follow a formal procedure if
there is a requirement of new software which is not on the approved list of software maintained
by the company. Every workstation should be equipped with the best available antivirus software
and the virus definition files should be kept updated at all times. Every workstation should be
Employees must be careful when e-mail attachments are received from unknown senders, which
45
References
Adams, J., Khan, T.A., Raeside, R. & White, D., 2007.
The research methods for
graduate business and social science students. New Delhi: Sage Publication Ltd.
Applegate, L.M., Austin, R.D. & NcFarlan, F.W., 2007. Corporate information strategy
and management. McGraw Hill International editions ed. McGraw Hill Companies.
Baker, S., Ponniah, D. & Smith, S., 1998. Techniques for the analysis of risk in major
projects. The journal of the operational research society, 49(6), pp.567-72.
Bessis, J., 1998. Risk management in Banking. John Wiley & Sons Ltd.
Biggam, J., 2008. Succeeding with your master dissertation; A practical step by step
handbook. Open University press ed. Backshire, England: McGraw Hill education.
Blakley, B., NcDermott, E. & Geer, D., 2001. Information security is information risk
management. pp.1-8.
Bottino, L.J. & Hughes, W.J., 2006. Security measures in a secure computer
communication architecture. pp.1-18.
Bryman, A. & Bell, E., 2007. Business Research Methods. 2nd ed. New York: OUP
Oxford.
campbell, D.T., 1995. The informant in quantitative research: The university of Chicago
press. p.389.
Chapelle, A., Crama, Y., Hubner, G. & Peters, J.-P., 2004. Basell II and operational
risks; implications for risk measurement and management in the financial sector.
Working paper. National Bank of Belgium.
Creswell, J.W., 2007. Qualitative inquiry & research design. 2nd ed. New Delhi: Sage
publication Ltd.
46
Cummins, J.D., Lewis, C.M. & Wei, R., 2006. The market value impact of operational
loss events for US banks and insurers. pp.1-33.
Dey, M., 2007. Information security management - A Practical Approach. pp.1-6.
Doherty, A., 2000. Innovations in managing catastrophe risk. The journal of risk and
Do'stlaringiz bilan baham: