Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

DISCUSSION_1

Information security within an organization could be easily compromised once the access to information is given from insiders or stolen from the outsider by any means possible. Based on my experience as supervisors, managing a supermarket, I was often met with similar situations as described by the boss.

Calls from individuals with presumable made-up name claiming to be as vendors who would like to supply their products to our supermarket, often turn into conversations that are related to sensitive information relating other vendors, their product, and price related questions.

Spam messages that have become identifiable normal email communicate from vendors could also pose the great security risk for the organization.

According to Kaspersky, Spam emails are sent out to the recipient for spreading malicious code onto recipients' computers and running phishing scams to obtain sensitive data like password and financial information (Kaspersky, 2018). From my previous experience, these emails are usually the cause of computer breakdown and loss of information in a couple of branches which had supervisors who had little knowledge regarding computer and Spam will using email.

As for people who have been seen searching company's trash dumpsters for recyclable containers, it is obvious that they attempted to salvage any possible sensitive information from the company.

In this case, the management should have met within the company with employees who have direct access to company sensitive information. Inform everyone of possible attempt to breach information security and educate those who might have little knowledge of email spam.

Disposable documents through recyclable dumpsters need to be thoroughly managed to ensure that no possible information could be gathered through the trash. And lastly, ensure that employees understand their role regarding using and sharing sensitive information via telephone calls, email and hard documents to ensure information security in the company.

Below are methods an organization guarantees that its system is ensured:

Install Anti-Virus Software:

Guarantee that legitimate hostile to infection programming is introduced on all computers. This ought to incorporate all servers, computers, and workstations. On the off chance that workers utilize PCs at home for business utilize or to remotely get to the system, these computers ought to likewise have against virus programming introduced.

Ensure that the anti-virus software is up and coming:

Regular new PC viruses are being discharged and it is fundamental that organizations are shielded from these infections by keeping the counter infection programming a la mode. On the off chance that conceivable, organizations should take a gander at strategies whereby PCs that don't have the most avant-garde hostile to infection programming introduced are not permitted to interface with the system.

Employ a firewall to ensure systems:

As PC infections can spread by implies other than email, it is imperative that undesirable activity is hindered from entering the system by utilizing a firewall. For clients that utilization PCs for business far from the assurance of the organization's system, for example, home PCs or PCs, an individual firewall ought to be introduced to guarantee the PC is ensured.

Filter all email movement:

All approaching and active email ought to be separated for PC infections. This channel ought to preferably be at the edge of the system to anticipate PC infections. Messages with certain record connections regularly utilized by PC infections to spread themselves, for example,EXE,COM and.SCR documents, ought to likewise be kept from entering the system.

Article 2:

In my view all of these strange incidents were caused by social engineering. The main objectives of social engineering are the same as hacking .To get unauthorized access to system or information submit misrepresentation, organize interruption, modern reconnaissance, wholesale fraud, or essentially to disrupt the framework or system. Run of the mill targets incorporate phone organizations and voice-mail, enormous name partnerships and budgetary establishments, military and government offices, and doctor's facilities.

Social engineering can happen in two ways. One the physical and the psychological. First we will focus on physical setting for these attacks, the working environment, the telephone, your trash, and even on-line, in the work environment, the hacker can essentially stroll in the entryway, as in pictures.

And pretend to be a support laborer or advisor who can access the association. At that point the gatecrasher swaggers through the workplace until the point that he or she finds a couple of passwords lying around and rises out of the working with adequate data to abuse the system from home soon thereafter. Another technique to get authentication information is to just simply remain there and watch an employee type in his password.

Social Engineering by Phone

The most pervasive sort of social engineering is led by telephone. A programmer will call up and emulate somebody in a place of authority or pertinence and step by step pull data out of the client. Help desk are especially inclined to this kind of assault.

Dumpster Diving

Dumpster diving, also called as trashing, is another popular method of social engineering. A colossal measure of data can be gathered through organization dumpsters.

The LAN Times recorded the accompanying things as potential security spills in our junk: "organization telephone directories, authoritative diagrams, updates, organization strategy manuals, timetables of gatherings, occasions and excursions, framework manuals, printouts of touchy information or login names and passwords, printouts of source code, plates and tapes, organization letterhead and notice shapes, and obsolete equipment."

These sources can give a rich vein of data for the programmer. Telephone directories can give the programmers names and quantities of individuals to target and imitate. Hierarchical diagrams contain data about individuals who are in places of expert inside the association.

On-Line Social Engineering

The Internet is ripe ground for social designers hoping to collect passwords. The essential shortcoming is that numerous clients frequently put only same password on each different account.

Prevention for social engineering:

· Prepare workers/help desk people to never give out passwords or other secret information by telephone.

· Tight identification security, representative preparing, and security officers show.

· Try not to type in passwords with any other person display (or in the event that you should, do it rapidly

· Telephone (Help Desk) All workers ought to be doled out a PIN particular to enable work area to help

· Keep all waste in secured, monitor area, shred critical information, and delete attractive media.

PLEASE READ ABOVE 2 ARTICLES AND COMMENT WITH 150 WORDS ON EACH ARTICLE

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92829283
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Management Information System

Three discussions minimum 300 words each discussionuse your

Three discussions (minimum 300 words each discussion) Use your own words when you can (personal experience), if it needs to be cited please cite it correctly 1st Discussion (minimum 300 words) IT Project Management - Pro ...

In your role as information security consultant create a

In your role as information security consultant, create a strategy for an effective user training, access, and account management program for the project organization. This strategy should include the following component ...

Questions what is your practical experience with physical

Questions : What is your practical experience with Physical Security Protocols? In your current job, what are the physical security protocols that you are required to follow and explain the one you find most annoying? Wh ...

Case 4 reviews the therac-25 case study and the medical

Case 4 reviews the Therac-25 case study and the medical linear accelerator that occurred between 1985 and 1988. To answer the questions, you should perform additional research, or use your own critical analysis. Please s ...

Assignmentyou are hired as a research coordinator by the

Assignment You are hired as a research coordinator by the new hospital in town. One mission of the hospital is to work hard in preventing health issues by using new technologies created by health conscious engineers. You ...

Case study design scenario - a read the harriets fruit and

Case Study : Design Scenario - A Read the Harriet's Fruit and Chocolate Company case study found in Chapter 2 of the textbook. Then, answer the questions below. Each response should be one (1) paragraph in length submitt ...

The format of your paper will need to follow the following

The format of your paper will need to follow the following outline in APA format (include title page, abstract page, content pages, and reference page): INTRODUCTION State the topic you are attempting to cover State the ...

1discussion 1your state has a forthcoming referendum

1. Discussion 1: Your state has a forthcoming referendum concerning no smoking in public places including bars and restaurants. Follow the ten steps on page 137 on negotiation planning. 2. Discussion 2: I. Understanding ...

Question - given that the money and human resources are

Question - Given that the money and human resources are ultimately limited, what can be done to improve the EFFICIENCY of the US healthcare system? Please answer this question from two perspectives: 1. What should (can) ...

Choose your roadmap to certification part 2 federal

Choose Your Roadmap to Certification Part 2: Federal Information Security Modernization Act (FISMA) Compliance In this assignment, students will review the federal work sector requirements and executives/organizations pr ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As