.

Tuesday, August 27, 2019

Security Solution Essay Example | Topics and Well Written Essays - 750 words

Security Solution - Essay Example The critical point of the matter is that some of the company’s key competitors have already hacked the company’s strategies and that they are already using their techniques. No one knows anything about the source of the attack. However, the management is suspicious that some greedy employees could be associated with the attack and that they reveal vital information to its competitors. The network administrator of the ABC Company has limited understanding of attack methodologies while the company lacks valid security measures. Information regarding the company’s products, the raw materials available, quantity of finished goods, and their prices has been disclosed through a database which has been open for users from across the company. All company’s information has been easily accessible and modifiable by every user in the organization. This has been the key problem to the company security and has resulted to the attack and has lead to leaking and hacking o f data on their laptops. In order to protect the internal data of the company, adequate security measures should be taken with critical observation of the laid down strategies to ensure success in the attainment of security within the company (Essaaidi et al., 2006). The storage of data should be structured in an appendix whereby each department can have an access only to its information. A specific file saver should contain folders which contain specific information for each department with a ‘login’ option while personnel from a particular department should not be able to access information from another department’s folder. The encryption mechanism should be devised to ensure that data belonging to a particular user is accessible to that user only. The installed OS in the company computers should be updated with the latest patches and fixes while modification on information on each database should only be done by the head of department. Not even the network adm inistrator should have the right to modify information on the database but should, however, access the information in a ‘read only’ mode. In order to ensure that the computers are not accessed from outside the organization, which has greatly contributed to the hacking, the available OS in the computers should be updated and configured. The outdated OS present in the computers need to be updated to ensure that no outsider can access the computers. The company should also consider installing an anti-spyware tool. This tool monitors all activities on the computer. The tool can be accidentally installed within program downloads and other files while their use is often cruel. They can capture passwords credit card details as well as banking credentials and relay them back to cheaters. Anti-spyware will help in monitoring and protecting the computers from spyware threats and is free to update and use (Stamatellos, 2007).   On the implementation of the solutions, the organiz ation will require to inform all employees on the changes and possibly train the relevant authorities on how to operate the installed devices in their computers. The organization should also give briefings to all employees, department heads and the network administrators on the need to have such amendments at such a time. The briefings should be meant to declare the attack an organizational disaster which calls for responsibilities from all partners for its termination. The solutions would ensure that the c

No comments:

Post a Comment