Thursday, May 9, 2019
Evaluating And Meeting Security Needs Research Paper
Evaluating And Meeting Security necessarily - Research Paper ExampleThis has numerous benefits, but also, great finds and vulnerabilities to the info. The most significant threat is that, if the information is tampered with or changed, it is all compromised at once. This paper will analyze the information security needs of the illumination Walkers Company Ltd, and propose ways for meeting those needs within a network information trunks architecture framework. The Light Walkers Company Ltd runs on an enterprise governing body structure where all the data and information system functions be centralized. The employment and integration of this system brings about great advantages to the organization. The limitations, though few, can be analyze (Dhilon, 2006). One of the major concerns is the protection of data from intruders. Beca aim of the centralization if its functions, Light Walkers Ltd is at a great risk of intrusion and illegal addition to its files. If it is hacked, th e hacker/intruder would have access to all their information. If it is infected by a virus, all their business files, due to their centrality, will also be impairmentd (Arison & Torkzadet, 2008). Unauthorized access from within the organization is also another security risk. Unauthorized personnel whitethorn access the system and alter data. This can happen accidentally or with intended malice, so as to gain from the data alteration. For these reasons, access to files in an information system raceway on enterprise architecture needs to be regularly and strictly monitored. In such a system, alteration or deletion of data may have disastrous effects. Another form of risk that the data faces is the risk of loss. As a pass on of the centralization of its functions, most information regarding the operation of Light Walkers Ltd is kept close together. If loss or damage was to occur to the storage and operating station, all the data would be lost at once. These are about of the securit y needs faced by this organization. Many of these problems are faced by organizations or companies running information systems on this platform (Arison & Torkzadet, 2008). One of the major problems that face centralization of data is the possibility of intrusion. To foreclose this breach, the information should be kept in a secure place where access is heavily restricted. If the information is being transferred over a network, the information must be encrypted to prevent tampering with the information as it crosses the network. There are several ways in which intruders can access, change, tamper or modify the data (Dhilon, 2006). The problem of unauthorized access is also rampant in enterprise integrated systems. This can be handled by placing privileges on the personnel that have access to the data. This helps monitor who has had access to the systems and the changes that they have made. Also, be move of the risk of tracking, administrators are advised to regularly change their cr edentials to achieve a high level of security (Dhilon, 2006). The use of once off passwords should also be employed to levels where critical data is stored. This reduces risk of unauthorized access. Viruses and leering computer programs are designed to damage a system. These programs usually attack vulnerable systems, and the damage they cause can be monumental because of the unexpected behavior of these programs. Light Walkers Ltd should have fully activated and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment