Legacy Systems. Legacy systems can become sources of interpersonal conflict within and across organizations especially when the legacy systems have little to no security features built into them but, at the same time provide critically needed support to business operations. A risk assessment can be used to reduce interpersonal conflict by providing an objective evaluation of the risks associated with continuing to use legacy IT systems. The objective evaluation can then also be used to develop strategies for addressing security risks associated with the legacy systems (accept, mitigate, transfer, avoid). Sometimes, interpersonal conflict between managers and between executives can arise because the individuals involved are concerned about potential impacts upon their customers. Thus, it is important to consider how a company’s approach to legacy systems (keep / toss) will affect its customer base and ability to continue operations without interruption. 1. Prepare an argument that supports the “decommissioning” of legacy IT systems. (Decommissioning a legacy system can be a form of risk avoidance.) In your argument, identify and discuss two or more security related issues which could be used to justify using this strategy (decommissioning legacy IT systems) to address risk. 2. Next, prepare a counter argument for those same issues (argue against decommissioning). Your counter argument should use one or more of the remaining risk management strategies (accept, mitigate, transfer). Make sure that your selected strategies are also cost-effective or at least cost-neutral (no additional costs). You may use legacy IT systems as discussed in one of the case studies from this course as the starting point for your response. Be creative with your answers.

    Demise Systems

    It is leading to know that an environment that typically contains the demise systems is superseded by newlightlight solutions. The legitimate systems are leading restraint the profession lifecycle. However, decommissioning of the legitimate systems is leading in harmony to warranty issues that are akin to the government of the legitimate systems. This is leading consequently it eliminates the subsistence costs that are associated with the outdated systems. Decommissioning has its hold benefits such as dejected costs, abated cause, egress of lofty infrastructure and securing the demise basis (Vishwanath et al., 2015). Subordination is an effectual cause conduct strategy restraint the legitimate systems that possess been defenseless to warranty vulnerabilities. This is causative consequently this can be achieved through identification, disconnection, hardening and monitoring the cause. This earn qualify subordination goals, actions and contrivance restraint implementation. This earn qualify identification, prioritization, and implementation of actions to impoverish causes.


    Vishwanath, G. K., Ojha, P., & Banerjee, A. (2015). U.S. Patent No. 9,052,708. Washington, DC: U.S. Patent and Trademark Office.