Due to the manufacture of high quality goods as a result of certification the

Due to the manufacture of high quality goods as a

This preview shows page 12 - 15 out of 16 pages.

Due to the manufacture of high-quality goods as a result of certification, the Coca-Cola Company has been able to attract new customers hence resulting in an increased volume of sales to the company. The acquired certification by the Coca-Cola Company has positively impacted its business operation. The company is currently experiencing smooth operations as it has complied with the requirements of all regulatory authorities (Turker, 2018 p.75). This has also helped the Coca-Cola Company to have increased market share due to increased acceptance in various geographical regions (Turker, 2018 p.87). Considering the company operates in a very competitive industry, its compliance with various certifications provisions has enabled it to live the competition. This is because it faces no operational frictions from the society as well as the legal authority.
Image of page 12
COCA-COLA COMPANY INFORMATION SECURITY 13 Threat identification and Risk assessment Information is the source of life in an organization, and it has the power of building or destroying the reputation of an organization. As a result, the information security management system of any company should ever be under a tight security infrastructure. Due to technological advancement, information security systems of organizations have become prone to attack by unaccountable security threats (Peltier, 2016 p.75). The Coca-Cola Company should employ the most appropriate information technologies to secure their information from leaking to malicious individuals who can interfere with the integrity and reliability of the information. For effective information security, models should be put in place to permit early identification of threats from hackers and cyber terrorist so that mitigation measures can be implemented. It is recommended that Coca-Cola Company conducts a frequent assessment of its external environment to establish all the possible threats that their information security system could be facing. It will also help in determining the reliability of their used information security systems as it could be using an outdated security system. Moreover, the company should adopt the Product-Life-Cycle model to help in effective threat identification (Guinée et al , 2017 p.727). The Coca-Cola Company should also integrate its information security systems with firewalls and intrusion detection software. With the use of intrusion detection software, the company’s information security systems will be secured from all form of threats. The software will also notify the company attempts of unauthorized access into their security systems thus ensuring measures can be taken to prevent such access (Lopez et al , 2016 p.499). Firewalls will help in identifying any attempt by unauthorized individuals to penetrate their information network structure by availing a timely threat recognition mechanism. On the other hand, risk assessment will be vital in enhancing the information security of the Coca-Cola Company. This is because it
Image of page 13
COCA-COLA COMPANY INFORMATION SECURITY 14 will be used in identifying the risk areas of the used information security system which can be a loophole for facilitating a security breach.
Image of page 14
Image of page 15

You've reached the end of your free preview.

Want to read all 16 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture