Bead Bar Consultant Checkpoint
Essay by review • February 25, 2011 • Essay • 300 Words (2 Pages) • 1,265 Views
What are Bead Bar’s major information security threats?
1. Poorly written software which means the software could inadvertently allow malicious code to attack data or a program without anyone’s knowledge.
2. An improperly configured system could allow someone outside of the organization access the internal system.
3. Computer viruses and worms are pieces of software that destroy data and or cause computers to become infected. Once a computer becomes infected, the computer begins to operating improperly.
4. An external beach of security is when someone outside of Bead Bar will internally attempt to access the internal system by hacking, cracking or using a script found on the internet.
5. An internal breach which is someone within Bead Bar that has the proper rights to access the system, but uses their access to do harm to the system. This person could be a former employee that their access rights have not yet been disabled or a current disgruntled employee.
A security awareness training plan for Bead Bar employees and franchises would include a plan and an education of the plan. The plan would include the proper use of passwords which would include a combination of numbers letters. Passwords are not to be obvious for example, the birthday of a user. The training plan would include that absolutely no one will ask them for their password. The plan would include the proper activities of the computer, which employees have what level of access and, how viruses and worms would be controlled.
The internet backup system that Bead Bar should use is one that will make nightly backups from the main server. Each Bead Bar will have their own records, the main server and the internet backup will have all the records. In essence there would be three copies of the data.
...
...