StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Security Solution - Essay Example

Cite this document
Summary
Security Solution Name Institution Security Solution The tire manufacturing company, ABC, has experienced much problems in as far as the protection of its privacy is concerned. The company’s customer information and some of its proprietary technology have fallen on the line of the attack…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
Security Solution
Read Text Preview

Extract of sample "Security Solution"

Download file to see previous pages

The critical point of the matter is that some of the company’s key competitors have already hacked the company’s strategies and that they are already using their techniques. No one knows anything about the source of the attack. However, the management is suspicious that some greedy employees could be associated with the attack and that they reveal vital information to its competitors. The network administrator of the ABC Company has limited understanding of attack methodologies while the company lacks valid security measures.

Information regarding the company’s products, the raw materials available, quantity of finished goods, and their prices has been disclosed through a database which has been open for users from across the company. All company’s information has been easily accessible and modifiable by every user in the organization. This has been the key problem to the company security and has resulted to the attack and has lead to leaking and hacking of data on their laptops. In order to protect the internal data of the company, adequate security measures should be taken with critical observation of the laid down strategies to ensure success in the attainment of security within the company (Essaaidi et al., 2006). The storage of data should be structured in an appendix whereby each department can have an access only to its information.

A specific file saver should contain folders which contain specific information for each department with a ‘login’ option while personnel from a particular department should not be able to access information from another department’s folder. The encryption mechanism should be devised to ensure that data belonging to a particular user is accessible to that user only. The installed OS in the company computers should be updated with the latest patches and fixes while modification on information on each database should only be done by the head of department.

Not even the network administrator should have the right to modify information on the database but should, however, access the information in a ‘read only’ mode. In order to ensure that the computers are not accessed from outside the organization, which has greatly contributed to the hacking, the available OS in the computers should be updated and configured. The outdated OS present in the computers need to be updated to ensure that no outsider can access the computers. The company should also consider installing an anti-spyware tool.

This tool monitors all activities on the computer. The tool can be accidentally installed within program downloads and other files while their use is often cruel. They can capture passwords credit card details as well as banking credentials and relay them back to cheaters. Anti-spyware will help in monitoring and protecting the computers from spyware threats and is free to update and use (Stamatellos, 2007).  On the implementation of the solutions, the organization will require to inform all employees on the changes and possibly train the relevant authorities on how to operate the installed devices in their computers.

The organization should also give briefings to all employees, department heads and the network administrators on the need to have such amendments at such a time. The briefings should be meant to declare the attack an organizational disaster which calls for responsibilities from all partners for its termination. The solutions would ensure that the c

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Solution Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Security Solution Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1489872-security-solution
(Security Solution Essay Example | Topics and Well Written Essays - 750 Words)
Security Solution Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1489872-security-solution.
“Security Solution Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1489872-security-solution.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Solution

Data Security Solution for the Design Studio One Company

The aim of this paper is to research a Data Security Solution requested by the executive management team of the “Design Studio One” company.... The data security technology solution will give strategic implications of the information technology solution on the business for the next three years.... hellip; The company is a need for establishing security procedures including data monitoring periodically.... lthough the current service is robust and customers have full control over their project, the management team noticed that some of the customers complained about the security problem of both servers and the control panel of the company's website....
7 Pages (1750 words) Case Study

The Necessity of Information Security in Modern Organizations

Moreover he also pointed out that “European companies to splurge on BPO services “Spend on financial services' Back office,… The above information point towards the huge dimensions of the information security related problems we are facing now.... The term Information security refers to the protection of information and Based on the nature of the information, we can classify information into two board categories; private and public.... So, most of the organizations are currently spend enormous amount of money for information security....
4 Pages (1000 words) Term Paper

Vulnerability Scanning

perfect vulnerability scanner should meet the Security Solution purposes and a tool which can proactively identify the security issues and provides a solution before a hacker attains a chance to exploit these issues.... Simple vulnerabilities scanners only check the information about software version and windows registry and determine whether d: Vulnerability Scanning Vulnerability scanning deals with the staple information for security as no software is perfect for the security purposes....
1 Pages (250 words) Essay

Health Care IT Systems

The author of this essay "Health Care IT Systems" touches upon the IT in medicine.... According to the text, the main function of the CIO to solve the problems related to Information Technology for the top level management in the healthcare organization.... hellip; CTO (Chief Technology Officer) is an Information Technology designer to build IT infrastructure in the healthcare organization....
5 Pages (1250 words) Essay

Week 4 discussion

This is because the Security Solution/device must be able to see data in the same way as the application to be protected in so as to map out areas of threat.... Implementation of application firewalls is the only Security Solution able to detect, prevent and even defeat such malicious actions on crucial web applications.... Competitions can be organized periodically within or between universities under monitored conditions on issues such as security....
2 Pages (500 words) Assignment

E-commerce as a Popular Way of Doing Business

hellip; This report seeks to elaborate on the security aspect of e-commerce.... This led to the need for beefing up security as far as e-commerce is concerned.... The security function in the websites belonging to buyers has been the very essence of doing business.... Even though the amount of security has increased in the recent years, the hackers keep on being creative by the day thus also requiring innovation as far as the security function of e-commerce is concerned....
12 Pages (3000 words) Coursework

Electronic Security Solutions and the Creation of the Right Balance

There is a dilemma which the best Security Solution option to use is.... The paper discusses the introduction of electronic security solutions has given rise to many debates regarding which between manned security and electronic security solutions is best suited for the consumers.... hellip; Several security measures types are required in different areas to provide security solutions in different locations with different degrees of crime vulnerability....
16 Pages (4000 words) Research Paper

End Point Protection Comparison

This report "End Point Protection Comparison" presents the choice of endpoint Security Solution that depends on the needs of an organization.... Likewise, the ease of use and integration with other security features is a determinant in acquiring an endpoint Security Solution.... The choice of any one solution among the three is dependent on a lot of factors and needs best outlined by each organization.... The IT infrastructure of an organization is usually protected by a multi-layered security model starting with a network firewall on the most outer layer and extending to each client protected by the endpoint security software on the most internal layer....
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us