Tuesday, February 18, 2020
Evaluating And Meeting Security Needs Research Paper
Evaluating And Meeting Security Needs - Research Paper Example This has numerous benefits, but also, great risks and vulnerabilities to the data. The most significant threat is that, if the data is tampered with or changed, it is all compromised at once. This paper will analyze the information security needs of the Light Walkers Company Ltd, and propose ways for meeting those needs within a network information systems architecture framework. The Light Walkers Company Ltd runs on an enterprise system structure where all the data and information system functions are centralized. The employment and integration of this system brings about great advantages to the organization. The limitations, though few, can be analyzed (Dhilon, 2006). One of the major concerns is the protection of data from intruders. Because of the centralization if its functions, Light Walkers Ltd is at a great risk of intrusion and illegal access to its files. If it is hacked, the hacker/intruder would have access to all their information. If it is infected by a virus, all their business files, due to their centrality, will also be damaged (Arison & Torkzadet, 2008). Unauthorized access from within the organization is also another security risk. Unauthorized personnel may access the system and alter data. This can happen accidentally or with intended malice, so as to gain from the data alteration. For these reasons, access to files in an information system running on enterprise architecture needs to be regularly and strictly monitored. In such a system, alteration or deletion of data may have disastrous effects. Another form of risk that the data faces is the risk of loss. As a result of the centralization of its functions, most information regarding the operation of Light Walkers Ltd is kept close together. If loss or damage was to occur to the storage and operating station, all the data would be lost at once. These are some of the security needs faced by this organization. Many of these problems are faced by organizations or companies running information systems on this platform (Arison & Torkzadet, 2008). One of the major problems that face centralization of data is the possibility of intrusion. To prevent this breach, the information should be kept in a secure place where access is heavily restricted. If the information is being transferred over a network, the information must be encrypted to prevent tampering with the information as it crosses the network. There are several ways in which intruders can access, change, tamper or modify the data (Dhilon, 2006). The problem of unauthorized access is also rampant in enterprise integrated systems. This can be handled by placing privileges on the personnel that have access to the data. This helps monitor who has had access to the systems and the changes that they have made. Also, because of the risk of tracking, administrators are advised to regularly change their credentials to achieve a high level of security (Dhilon, 2006). The use of ââ¬Ëonce offââ¬â¢ passwords should also be employed to levels where critical data is stored. This reduces risk of unauthorized access. Viruses and malicious computer programs are designed to damage a system. These programs usually attack vulnerable systems, and the damage they cause can be monumental because of the unexpected behavior of these programs. Light Walkers Ltd should have fully activated and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.