You are on page 1of 5

Quality Web Design Company

Weakness Assignment
Course: SEC 571
Analysis of Quality Web Design Company
Manpreet Singh
Professor: Jonathan Coombes
Keller School Of Management

Quality Web Design Company

Quality Web Design


Software requirements:

The software should have a very user friendly interface. This will help the user make

proper utilization of the software.


A proper debugging unit must be set up so as to ensure the eradication of all bugs. The
lesser the bugs, the better & more efficient the software works. Moreover, one of the most

important functions of debugging is enriching user experience.


The coding involved should be precise and critical. It is because of the fact that when the
software is on the verge of modification, itll be easy to finally work on the software.

Software definitely requires improved security measures because its the most vulnerable one
among the three, and all the important data, work etc. is stored in software. More than anything
we need to protect software, Kirk Hausman, Nik Alston, Mike Chapple (November, 2005)
Vulnerability:

The rival companies will eye the product and try to reverse engineer it and develop

something new. Thus, the technology once discovered should be patented.


The product will face difficulty satisfying the customers in longer run.

Threats
There are n number of threats to the assets and policies in a web designing company.
As at this point of time there are many competitors in this field. Threats like social engineering,
advance persistent threats, internal threats, BYOD threats, cloud security, HTML5 threat, botnets
and precision targeted malware.

Quality Web Design Company

The company will face serious trouble unless it takes up measures to counter the products
by different companies in order to succeed.
This will act as an opportunity once the company invests in the R&D (research and
development) section of the firm, Tomer Teller (May, 2012).
Likelihood that the threat will occur
Probability of threat is very strong if the system isnt managing or working properly.
Moreover the system needs to redefine itself and conquer things to keep itself threat free. If we
dont establish measurement objectives, which are to be done by stakeholders and team
members, we need to specify measures and work upon them which require SDLC, process
engineers, security experts, and then we need to specify data and store it in a confidential
manner. We need to keep our security system much stiff and strong so that the probability
decreases. But if we fail to do so there are strong chances that the threat will occur, Carol
Dekkers, Dave Zubrow, and James McCurley (February, 2007).
The consequences to mission critical business processes should the threat occur
We need to provide adequate measures to lessen this risk of lowering down of our
business. As all the above mentioned threats have long time effect on business therefore we need
to handle such situations properly. If the internal system is weak and acquired to threats than it
offers place for frauds, illegal activities and unauthorized work. If the record making system
isnt good than it is difficult to backup things, destruction of important works or documents etc.

Quality Web Design Company

2. How the organizations competitive edge will be affected should the threat occur
It is hard to deal with threats, once they have occurred as it is difficult to diminish their effect
once they start initializing in our work. Business or any or any other organization have one thing
in common and that is threat of competitiveness which upholds ones standing in a market and
also has a bigger effect on its reputation. All the employees there are working for a same cause
that is to reduce the effect of competition and work for their betterment but all the above
mentioned stances so clearly prove that all the threats are hard to overcome and once we are in
this viscous circle it is difficult to get out of it. All in all it ruins the companys working, standing
and decreases its productivity. All one can say threats destroy the company wholly.
The weaknesses involve:

Software and policy: The software needs proper licenses to function well in the long run.
Thus policy needs to be recapitulated and the software guidelines need to be laid

accordingly in order to achieve better customer satisfaction.


Hardware and policy: The hardware plays a vital role in a solution providing firm. The
better the tech is, more chances of creating an efficient program increase. Thus, hardware
should be selected very carefully and in such a manner that it neither it violates the

policy, nor the guidelines set by the company.


Hardware and software: This is perhaps, one of the most important relationships that is
responsible for the working of a product. Thus, it should be a symbiotic relationship that
would benefit the user in a subtle manner. Hardware and software are in inverse
relationship, so the manufacturer needs to establish a balance in order to achieve a very
good performance, Kate Vinton (January, 2014).
References

Quality Web Design Company

Kirk Hausman, Nik Alston, Mike Chapple (November, 2005). Protecting your
network from security risks and threats. Retrieved From-

http://www.informit.com/articles/article.aspx?p=419051&seqNum=9

Tomer Teller (May, 2012) The biggest cyber security threats of 2013. Retrieved From
http://www.forbes.com/sites/ciocentral/2012/12/05/the-biggest-cybersecurity-threats-of-

2013-2/
Carol Dekkers, Dave Zubrow, and James McCurley(February, 2007)
Measures and Measurement for Secure Software Development.
Retrieved From- https://buildsecurityin.us-cert.gov/articles/bestpractices/measurement/measures-and-measurement-secure-softwaredevelopment

Kate Vinton (January, 2014) How companies can rebuild trust after a security
breach. Retrieved From-

http://www.forbes.com/sites/katevinton/2014/07/01/how-companiescan-rebuild-trust-after-a-security-breach/

You might also like