Through this scenario of the becoming organization, there are many possessions. The equipment in place features a Dell OptiPlex 390 computer that uses software which has Microsoft House windows 7 professional edition incorporated with the refined software such as the Microsoft Workplace, along with an 8×5 support and maintenance contract that allows her to update her software at a reduced rate. On this computer, most business transactions and bills are stored. She also provides a Point of Sales pc from InitiaTek. The POS software works Windows six in the Ms Virtual COMPUTER virtual machine.

NEED AN ESSAY WRITING HELP?

The configuration with the POS system consists of self-contained funds drawer and sales enroll and tabulation and transaction software, written in C#. NET. This technique is networked over the wifi network directly to the backside office computer system, also using WEP. The software is also able to record almost all transactions to the back office pc into the Ms Access databases. In addition to that, this lady has a custom program intended for accounting. Almost all business records and accounts are trapped in Microsoft Expression as paperwork or since text documents.

We will write a custom essay sample on
A Fever You Can't Sweat Out by Panic! At the Disco
or any similar topic specifically for you
Do Not Waste
Your Time
HIRE WRITER

Only $13.90 / page

Different hardware products include a fax machine and a printer.

Step two Assess the Weakness

Information on the back office laptop is vulnerable for many reasons. Allowing use of the computer to all or any of the employees makes for information to be available. She also does not back up her files in any way and does not safeguarded her information with virtually any encrypted files or any extra security measures. The only secureness measure that may be in place can be her Manager password, which can be extremely fragile. Her personnel can logon using an Assistant bank account to do fundamental things however, if the need to work on a project that will require more programs they would need to use the Officer account. The web connection can be WEP protected but again, has a weak username and password.

Step 3 Measure the Probability and Severity of injury

After reading and analyzing this scenario, there is an extremely large probability that security from this business will probably be breached. To start with the use of weakened passwords in both the Administrator login and the network interconnection will allow quick access from online hackers and employees with negative intensions. Additionally the business is poorly shielded because the girl uses the free variations of firewall and virus scanner. There’s also a high possibility that your woman can reduce all of her data and her business computer to viruses and malware. Allowing employees to surf the net without proper secureness can also improve the risk. I would personally rate the security risk for the corporation as substantial.

Ann Roger’s company “The Becoming Company has a good way to go to consider itself harmless and secure. There are many disadvantages in the reliability including weakened passwords, protection from viruses and malware, and protecting important business details. If Ann does not spend on some major alterations, her organization may be in danger. Some ideas may include adding an additional computer for school, one computer for her the administrator and a computer for the employees. Adding a more robust firewall. Trading on better programs from reputable corporations. Creating alphanumeric passwords that change annually. Another secureness measure would be to block websites from the Internet. An essential addition that Ann can invest in can be backing up every her organization information and invoices on the separate hard disk or around the Internet just in case something occurs the business computer systems.

you

Prev post Next post
ESSAY GUIDE
Get your ESSAY template and tips for writing right now