EXERCISE
- In what way can IT be used to detect unauthorized access - benefits and drawbacks?
By installing a security software such as anti-virus or anti-malware software.
Benefits:
- To protect the computer from virus.
- The data cannot be access and stolen from the hackers.
Drawbacks:
- This software must be updated frequently.
- It also consume large amounts of processing power and RAM during scans and updates.
- False positives can lead to legitimate files being blocked or deleted.
- In what way can IT be used to detect and defend against damage to data and equipment?
Detect - The user will get a notification by email when someone trying to access the user's account.
Defend - The user have to make a strong password for his/her account.
- Discuss the importance of organisational security. Demonstrate how organisational security could affect business continuance.
It is important to protect company's assets of securing the computer and network security. The computer and network security is concerned with the integrity, protection and safe access of the confidential information.
How it could affect business continuance?
By installing the security, it can help the business to protect the data from being stolen.
- Identify and provide THREE (3) example of security breaches.
- Virus - It can be send to the user's computer system to stole the data.
- Social engineering - they will pretend to be the one who fixed the network.
- Internet Protocol (IP) spoofing - It is refer to network hijacking. When the user's and hacker's use the same network to access the user's information.
- Discuss how business operations could be affected by security breach.
Internet Protocol (IP) spoofing:
When the company are not using a strong password and the hacker can access the company's network. Then the hacker can access the company's computer system and stole the confidential company's data. The data can be leak and also the hacker can sell the company's data to other company.
- Make a scenario where a security breach has a major operational impact and create a solution to recover from the breach.
An employee is at the airport waiting for his flight. The employee has the company's laptop for work purpose and logs in to an unknown free network while waiting. Behind the free network is a person who spoofs his network and monitors his every activity. Knowing that the employee logs in to his account using the unknown network, the person can steal every confidential data from the company from just spoofing his network.
The solution: Make the company's account accessible only in the company, it is limited only to the company's zone. Do not connect to an unidentified network access. Use strong password for the company's account.
REFERENCES
No comments:
Post a Comment