Wednesday, October 16, 2019
Centralized PC Security Essay Example | Topics and Well Written Essays - 1250 words
Centralized PC Security - Essay Example To protect data, security policies are required to be defined. Contingency planning is also an essential aspect which cannot be disregarded. As per Ramesh, V.C., and Xuan Li there are three dimensions of contingency planning ââ¬Å"The first issue concerns the handling of multiple objectives; we discuss the benefits of using fuzzy logic for handling this issue.à The second issue is the consideration of the economic cost of post-contingency corrective actions as well as the utility of discrete control actions that complicate the modeling and solution of the contingency planning problem.à The last issue is the need for of advanced parallel computing techniques for addressing the real-time aspects of many contingency planning problems;â⬠2 Analysis of Problems ABC Corporation has twenty seven desktop workstations either connected with each other via a hub or a switch. The workstations are only workgroups as there is no domain and security policies applied in the organization ex cept some users have Internet access and only the manager has a separate email account. There is no email server available to provide separate email addresses to employees. The separate email addresses enables instant correspondence between the subordinates, hence making the communication better and cost effective. Currently the employees are using telephone for coordination which is not cost effective. Some workstations are used to store data. There is no access policy defined for the data stored in the workstations. The data is vulnerable as anyone can access it or delete it. The server is used only for providing internet access and data transfer within the network. There is no firewall installed in the network, either hardware or software which makes the data, hardware, software defenseless. There is no connectivity between the regional offices and head office. The manager access the financial information from the head office using the computer network. The 5 regional offices hav e five databases which they are maintaining individually. Immense amount of time is wasted when head office sends a CD named ââ¬Å"House types dataâ⬠to each regional office. The administrator copies the files available on the CD to the locally maintained database. The data is updated because the project managers have to access the plans and building specifications of the houses the company builds. The data contains all the detailed information of the house construction material which is required. There is no backup of devices, data, workstations and server. If any workstation containing database crashes, the data will be lost. 2.1 Security Vulnerabilities The impact of the security breach issues is unpredictable. It can be diverted and involves human suffering as well as revenue loss for the organizations. One of the security breach took place on 21 October 2010, as per ââ¬Å"www.networksecurityedge.comâ⬠The Philadelphia Inquirer states ââ¬Å"Keystone Mercy Health Pla n and AmeriHealth Mercy Health Plan have notified 280,000 Medicaid members that their information may be at risk after a portable computer drive containing the names, addresses, and health information was lost. The last four digits of 801 members' Social Security numbers were also stored on the hard driveâ⬠. This incident is related to theft of the hardware devices risking 280,000 Medicaid
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.