Thursday, May 9, 2019

Security Solution Essay Example | Topics and Well Written Essays - 750 words

Security Solution - audition ExampleThe critical point of the matter is that some of the attach tos key competitors have already hacked the companys strategies and that they are already using their techniques. No one knows anything about the source of the attack. However, the counselling is suspicious that some greedy employees could be associated with the attack and that they reveal vital information to its competitors. The network executive of the ABC Company has limited understanding of attack methodologies while the company lacks valid security measures. entropy regarding the companys products, the raw materials available, quantity of finished goods, and their prices has been disclosed through a database which has been open for substance abusers from crosswise the company. All companys information has been easily admission feeible and modifiable by every user in the brass. This has been the key problem to the company security and has resulted to the attack and has lead to l eaking and hacking of data on their laptops. In order to protect the internal data of the company, adequate security measures should be taken with critical card of the laid down strategies to find out success in the attainment of security within the company (Essaaidi et al., 2006). The storage of data should be structured in an appendix whereby all(prenominal) department butt have an access only to its information. A specific file saver should contain folders which contain specific information for each department with a login option while personnel from a particular department should not be able to access information from another departments folder. The encryption mechanism should be devised to ensure that data belonging to a particular user is accessible to that user only. The installed OS in the company computers should be updated with the latest patches and fixes while modification on information on each database should only be done by the head of department. Not even the ne twork administrator should have the right to metamorphose information on the database but should, however, access the information in a read only mode. In order to ensure that the computers are not accessed from outside the organization, which has greatly contributed to the hacking, the available OS in the computers should be updated and configured. The outdated OS present in the computers rent to be updated to ensure that no outsider freighter access the computers. The company should also consider installing an anti-spyware tool. This tool monitors all activities on the computer. The tool can be accidentally installed within program downloads and other files while their use is often cruel. They can stupefy passwords credit card details as well as banking credentials and relay them back to cheaters. Anti-spyware leave help in monitoring and protecting the computers from spyware threats and is free to update and use (Stamatellos, 2007). On the implementation of the solutions, the organization will require to inform all employees on the changes and possibly train the relevant authorities on how to operate the installed devices in their computers. The organization should also give briefings to all employees, department heads and the network administrators on the need to have such amendments at such a time. The briefings should be meant to declare the attack an organizational calamity which calls for responsibilities from all partners for its termination. The solutions would ensure that the c

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.