Tuesday, June 18, 2019
Security Solution Essay Example | Topics and Well Written Essays - 750 words
Security Solution - Essay ExampleThe exact point of the depicted object is that some of the attach tos key competitors have already hacked the companys strategies and that they are already using their techniques. No one knows anything about the origin of the attack. However, the management is suspicious that some greedy employees could be associated with the attack and that they reveal vital culture to its competitors. The network administrator of the ABC Company has limited reasonableness of attack methodologies while the company lacks valid security measures. Information regarding the companys products, the raw materials available, quantity of finished goods, and their prices has been disclosed through a database which has been frank for users from across the company. All companys information has been easily accessible and modifiable by every user in the organization. This has been the key problem to the company security and has resulted to the attack and has lead to leaking and hacking of data on their laptops. In order to protect the internal data of the company, adequate security measures should be taken with critical observation of the laid down strategies to ensure success in the attainment of security within the company (Essaaidi et al., 2006). The storage of data should be structured in an appendix whereby each department can have an access all to its information. A specific file saver should contain folders which contain specific information for each department with a login option while personnel from a particular department should not be able to access information from other departments folder. The encryption mechanism should be devised to ensure that data belonging to a particular user is accessible to that user only. The installed OS in the company computers should be updated with the latest patches and fixes while modification on information on each database should only be done by the head of department. not even the network administrator should have the right to modify information on the database but should, however, access the information in a read only mode. In order to ensure that the computers are not accessed from outside the organization, which has greatly contributed to the hacking, the available OS in the computers should be updated and configured. The outdated OS present in the computers need to be updated to ensure that no outsider can access the computers. The company should as well consider installing an anti-spyware dickhead. This tool monitors all activities on the computer. The tool can be accidentally installed within program downloads and other files while their use is often cruel. They can capture passwords credit card details as well as banking credentials and relay them back to cheaters. Anti-spyware will help in monitoring and protecting the computers from spyware threats and is free to update and use (Stamatellos, 2007). On the effectuation of the solutions, the organization will require to inform all employees on the changes and possibly train the relevant authorities on how to operate the installed devices in their computers. The organization should also give briefings to all employees, department heads and the network administrators on the need to have such amendments at such a time. The briefings should be meant to declare the attack an organisational disaster which calls for responsibilities from all partners for its termination. The solutions would ensure that the c
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.