Discuss About The Vulnerabilities Their Defensive Mechanism?
STP Limited is an organization that is based out of Wollongong and has its head office in the same city. The organization manufactures cabinets and is expanding to the other regions as well. The sales and revenue are going good for the organization and as a result, it recently bought office premises in Bathurst and Lithgow. They have also set up a new office in Sydney. The company is currently located in four locations and has warehouse machines and other equipment installed in these locations.
There are new networking and communication technologies that are being used by STP Limited to enhance its connectivity and integration capabilities. Every office of the company is equipped with a modem and a switch and the Internet connection is made active with the aid of ADSL. The members of the staff are allowed to Bring their Own Devices at work which is also known as the BYOD scheme. The wireless connections are also made enable by the organization.
The enhanced network connections will allow the employees to be connected with each other at any hour of the day. It will aid in the resolution of the problems and conflicts in a timely manner and will make it possible to experience enhanced efficiency and productivity of the employees. The customers will also be able to contact the organization in case of any query or complaint. There will be enhanced help and assistance services provided which will make it easy to increase the levels of customer trust and engagement (Cisco, 2008).
The scope of the project will include the design, development and deployment of the measures so that the enhanced networking mediums are implemented. Privacy is one of the essential properties that are required to be maintained in association with the information and networks. The efforts will also be implemented to make sure that the privacy of the information and the communication networks is not disturbed or violated.
Alignment Perspective |
Description |
Strategic Execution |
· Project goals are in line with organizational goals. · The design, development and deployment of the networking, security, privacy and integration measures will be done to achieve the goals. |
Technological Potential |
· The wireless connections and networking equipment that have been set up are compatible with the organizational systems and applications. · The integration and security solutions that are proposed are feasible on the basis of technical feasibility study. |
Competitive Potential |
· Network security and privacy is a much in demand trend in the market. · Enhancement of the quality of service |
Service Level |
· A networking strategy has been designed and determined by the Project Manager so that the organization goals are met. · Resources have been allocated to the project tasks and activities at the operational and managerial levels. |
There are various issues that must be addressed from the point of view of network security. It must be made sure that there are enough human resources in the department of local IT as the support staff. It would be necessary to understand the significance of remote management of the security controls and mechanisms. The device configuration that is set up shall be allowed to be accessed with the means of HTTP, HTTPS, Telnet, SSL and likewise.
In a nutshell, the security solutions that are set up at the branch office must target the needs and requirements of the office sizes and these shall also be easy to deploy and economical in nature. Secure routing, WAN connections etc. shall also be included. This will eliminate the requirement of installing separate networking devices and equipment.
Another condition that must be considered is the changing landscape of the security threats and attacks. There may be some extremely severe implications of these attacks and threats. For instance, in the year 2003, Slammer worm infected 90% of the susceptible hosts in 10 minutes with the doubling rate of 8.5 seconds. There are signature based countermeasures that are being implemented in the organizations which cannot be updated at such a short period of time (Canavan, 2001).
Supplementing of the reactive countermeasures will be required that may have the ability to prevent the uncertainties and security attacks that are not predicted earlier. The use of network focussed defence mechanisms shall also be used for preventing the security attacks associated with application layer and services.
Mobile devices have become a crucial part of the IT infrastructure of a small business. However, it also presents certain risks to the company that is not always identified at the time of first implementation. Mobile devices give flexibility and mobility but are also faced with issues like limitations of the hardware and security concerns rising from downloading of un-trusted content.
A security strategy shall be developed and implemented to ensure the safety and security of the mobile devices. There are also unknown devices that may be connected to the office network with the use of BYOD technology.
Currently there are many staff at the company that are connecting wirelessly with a mobile device such as a laptop. The risk of such an environment is significant as the asset that holds the most value is very attractive to those who wish to steal or damage vital information. Capturing wireless data is one of the most common enterprise attacks external of the enterprise while rogue access points and evil twin access point are internalized. WLAN attacks can be overcome by proper configuration of devices and employee training programs.
Currently, the staff of STP Ltd can connect to the organization’s wireless network through their personal devices. This option has less financial constraints which is convenient for the company but at the same time, it is also exposed to greater risks. The confidential information of the company can get exposed because of user actions. Malicious software can also attack the device or the network affecting the security baseline of the organization. Thus, for the use of personal devices, minimum security requirements must be defined and the employees must be trained on the aspects of data protection and security.
Procurement strategy is an important area of operations of an organization as it keeps the operations going on. Purchase planning is vital for a company. Research can be used for aligning purchase processes with organizational strategy. This can improve financial and operational performance of the business. Hardware purchases would put some financial burdens to the organization and thus, contingency plans are required to be developed for ensuring that business operations remain continued.
Purchase of new hardware cannot be avoided as it can result from causes like loss, failure, or damage to the devices. As the Gympie store is located in an area which is flood prone and thus, it can be a concern for the company. STP limited has deferred the procurement risks by insuring its business assets. However, for preparing to deal with circumstances, certain documents and assets such as asset register, budget forecasts, emergency plans, policies, procedures, reviews and strategies can be created and maintained.
A review from employees as users of the hardware system can help identify concerns around outdated or overloaded application. It can also be known if the user is downloading or running certain applications on the devices causing load to the system unnecessarily. Reviews can be scheduled for evaluation of the hardware performed such that the management can take more informed decisions about procurement. The review would help management identify current issues as well as potential risks that can be faced in future.
The management must make sure that the company has enough funds for the hardware purchase which needs a careful, cash flow planning. Small organizations like the current one is more likely to have close coordination between employees and thus, strategic alignment would be better. If the organization needs to take the advantages of purchasing hardware at low price, suppliers have to be identified appropriately and the business needs have to be understood through exploration of the business requirements.
There are many equipment necessary for installation and testing purposes. Some of the necessary hardware may include the following:
If the company makes use of cloud based applications then the need for creating backup on the local devices is eliminated. However, the data that gets exchanged over the POS and other non-cloud applications is also the company’s responsibility. Thus, an offsite backup of the store has t be created such that data can be retrieved in case the site is damaged so that the business can be continued without interruptions. A cloud based system can be used for creating this backup which would ensure that most valuable assets are well protected from any losses. Multi-general backups can be created by administrators who would be responsible for the management of the departmental servers.
The internal and external environment of the organization affects its physical security. The organizations physical infrastructure could be located in a place that is prone to security risks such as network failures, power outages, road blocks, and floods. Thus, disaster recovery planning is essential such that staff can be made prepared to deal with such situations and ensure that business operations continuity is still maintained. In case of insider threats, it is the responsibility of the administrator to ensure that the systems remain secure and protected from insider threats.
There can be situations when an important employee or the owner of the organization is unable to work because of unforeseen situations such as injuries from accidents. The company must remain prepared to deal with such situations. Planning must include the details of the roles and the process for appointment of the other people who can take over the work in such circumstances. The strengths and weaknesses may be assessed and development opportunities may be identified through monitoring, support and evaluation.
The responsibility of dealing with the risks shall be distributed to all of the stakeholders. The risk responsibility shall be allocated for each of the risk that is identified. The mapping of the stakeholder must be done on the basis of the type and category of the risk (Berg, 2010).
The assessment of the risk shall be done on the basis of its impact and likelihood along with the various factors that may be associated with the risks. The risk ranking shall be applied and assigned to every risk.
A response strategy shall be defined for every risk that is identified and assessed. The response may include different treatment strategies and measures. There are various methods that may be applied for the risks, such as, avoidance, acceptance, transfer and mitigation (Crane, 2013).
It shall include the activities for the control of the risk along with the contingency plan associated with the same. The risk mitigation strategies as identified in the risk response process shall be applied and implemented for every risk (Dcu, 2015).
The risk mitigation strategy shall be applied and the same shall be tracked and reported by the Project Manager. There shall also be a weekly report that must be prepared to keep a track of the same and the senior management must carry out monitoring and control activities (Debono, 2016).
A security policy can be used for protecting the assets of an organization as well as for providing a baseline for the user conducts in a workplace. It can act as a tool that creates awareness in the people and help in building a culture that is supportive for the organization in terms of security.
The objective of defining an information security policy is to ensure that the ABC Company is able to keep its business continued in any situation of damage by any incident and the impact of such damages is minimized. The security policy is approved by a CEO or MD.
It is recommended that all the staff members are trained on security aspects such that they are able to deal with security challenges posed by web presence. Training can also foster a compliance program by pushing employees to use certain practices that can ensure that security threats are minimized.
If the information systems are integrated to provide real time reporting, it can give the company more capabilities than the case of Software as a Service model of adoption. Integration between applications is something like the web pages mashups in which external sources can be combined on the platform as a service (PaaS). For instance, Force.com is an example of the PaaS system which provides capabilities to build applications to independent software developers or vendors. SalesForce is one such application which is already used by the company.
Conclusions
Brach offices along with the personnel working in the offices are critical assets for the organization at the strategic level. It is essential to make sure that the security of these branch offices is ensured by developing and implementing the measures for security the data and mobile devices. There is an enhanced network management that must be carried out for securing the information and for maintaining the business continuity.
Recommendation 1: Implement procedures and policies for supporting the business continuity through consideration of the security aspects such as data protection in business strategy development.
Recommendation 2: The use of LAN and mobile devices must be limited till additional protection measures are taken that can be used for covering the mobile device access points.
Recommendation 3: An asset register may be maintained for supporting business continuity through the use of risk management processes.
Recommendation 4: A cloud based backup system can be created as an offsite solution such that the data remains safer and more reliable without the need of having physical backups.
Recommendation 5: Key employee roles that can replace other important employees critical for work must be identified in the succession planning to take over. They must be monitored, evaluated and supported in learning and take over process.
Recommendation 6: A training program must be run to make the employees aware of the security aspects and risk scenarios that are associated with business transactions.
References
Alabady, S. (2009). Design and Implementation of a Network Security Model for Cooperative Network. [online] Available at: https://www.iajet.org/iajet_files/vol.1/no.2/Design%20and%20Implementation%20of%20a%20Network%20Security%20Model%20for%20Cooperative%20Network.pdf [Accessed 18 Sep. 2017].
Berg, H. (2010). Risk Management: Procedures, Methods and Experiences. [online] Available at: https://ww.gnedenko-forum.org/Journal/2010/022010/RTA_2_2010-09.pdf [Accessed 18 Sep. 2017].
Canavan, J. (2001). Fundamentals of Network Security. [online] Available at: https://whc.es/Network/Fundamentals%20of%20Network%20Security.pdf.1.pdf [Accessed 18 Sep. 2017].
Cisco (2008). Wireless and Network Security Integration Solution Overview. [online] Available at: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/secwlandg20/sec_wireless_overview.pdf [Accessed 16 Sep. 2017].
Crane, L. (2013). Introduction to Risk Management. [online] Available at: https://extensionrme.org/pubs/IntroductionToRiskManagement.pdf [Accessed 18 Sep. 2017].
Dcu (2015). Introduction to Risk Management. [online] Available at: https://www.dcu.ie/sites/default/files/ocoo/pdfs/Risk%20Mgt%20Training%20Slides.pdf [Accessed 18 Sep. 2017].
Debono, R. (2016). Project Risk Management. [online] Available at: https://www.isaca.org/chapters11/Malta/Documents/Events/210416%20-%20Mark_Debono%20-%20Understanding_Risk_in_the_Field_of_Project_Management.pdf [Accessed 18 Sep. 2017].
Joshi, M. and Karkade, R. (2015). Network Security with Cryptography. [online] Available at: https://www.ijcsmc.com/docs/papers/January2015/V4I1201544.pdf [Accessed 18 Sep. 2017].
Pareek, R. (2011). Network Security: An Approach towards Secure Computing. [online] Available at: https://www.rroij.com/open-access/network-security-an-approach-towards-secure-computing-160-163.pdf [Accessed 16 Sep. 2017].
Soriano, M. (2011). Information and Network Security. [online] Available at: https://improvet.cvut.cz/project/download/C2EN/Information_and_network_security.pdf [Accessed 18 Sep. 2017].
Souppaya, M. (2013). Guidelines for Managing the Security of Mobile Devices in the Enterprise. [online] Available at: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r1.pdf [Accessed 18 Sep. 2017].
Strebe, M. (2004). Network Security Foundations. [online] Available at: https://imcs.dvfu.ru/lib.int/docs/Networks/Security/Network%20Security%20Foundations.pdf [Accessed 18 Sep. 2017].
Sujithra, M. and Padmavathi, G. (2012). Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism. [online] Available at: https://dl.icdst.org/pdfs/files/35dc646a4630971fd27c6b2d32661555.pdf [Accessed 18 Sep. 2017].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download