Tuesday, June 18, 2019

Evaluating And Meeting Security Needs Research Paper

Evaluating And Meeting Security Needs - Research Paper ExampleThis has numerous benefits, but also, cracking risks and vulnerabilities to the info. The most significant threat is that, if the data is tampered with or changed, it is all compromised at one time. This paper will analyze the breeding security needs of the Light Walkers caller-up Ltd, and propose ways for meeting those needs indoors a network information systems architecture framework. The Light Walkers Company Ltd runs on an enterprise system body structure where all the data and information system functions be centralized. The employment and integration of this system brings about great advantages to the organization. The limitations, though few, can be analyzed (Dhilon, 2006). single of the major concerns is the protection of data from intruders. Because of the centralization if its functions, Light Walkers Ltd is at a great risk of intrusion and illegal access to its files. If it is hacked, the hacker/intruder would mystify access to all their information. If it is infected by a virus, all their business files, due to their centrality, will also be damaged (Arison & Torkzadet, 2008). Unauthorized access from within the organization is also another security risk. Unauthorized personnel may access the system and alter data. This can happen accidentally or with mean malice, so as to gain from the data alteration. For these reasons, access to files in an information system running on enterprise architecture needs to be on a regular basis and strictly proctored. In such a system, alteration or deletion of data may have disastrous effects. Another form of risk that the data faces is the risk of loss. As a result of the centralization of its functions, most information regarding the operation of Light Walkers Ltd is kept close together. If loss or damage was to carry on to the storage and operating station, all the data would be lost at once. These are some of the security needs faced by thi s organization. Many of these enigmas are faced by organizations or companies running information systems on this platform (Arison & Torkzadet, 2008). One of the major problems that face centralization of data is the possibility of intrusion. To prevent this breach, the information should be kept in a secure place where access is heavily restricted. If the information is being transferred over a network, the information must be encrypted to prevent tampering with the information as it crosses the network. There are several ways in which intruders can access, change, tamper or modify the data (Dhilon, 2006). The problem of unauthorized access is also rampant in enterprise integrated systems. This can be handled by placing privileges on the personnel that have access to the data. This helps monitor who has had access to the systems and the changes that they have made. Also, because of the risk of tracking, administrators are advised to regularly change their credentials to achieve a high level of security (Dhilon, 2006). The use of once off passwords should also be employed to levels where critical data is stored. This reduces risk of unauthorized access. Viruses and malicious computer programs are designed to damage a system. These programs usually attack vulnerable systems, and the damage they cause can be monumental because of the unexpected behavior of these programs. Light Walkers Ltd should have fully activated and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.