Ask Management Information System Expert

DISCUSSION_1

Information security within an organization could be easily compromised once the access to information is given from insiders or stolen from the outsider by any means possible. Based on my experience as supervisors, managing a supermarket, I was often met with similar situations as described by the boss.

Calls from individuals with presumable made-up name claiming to be as vendors who would like to supply their products to our supermarket, often turn into conversations that are related to sensitive information relating other vendors, their product, and price related questions.

Spam messages that have become identifiable normal email communicate from vendors could also pose the great security risk for the organization.

According to Kaspersky, Spam emails are sent out to the recipient for spreading malicious code onto recipients' computers and running phishing scams to obtain sensitive data like password and financial information (Kaspersky, 2018). From my previous experience, these emails are usually the cause of computer breakdown and loss of information in a couple of branches which had supervisors who had little knowledge regarding computer and Spam will using email.

As for people who have been seen searching company's trash dumpsters for recyclable containers, it is obvious that they attempted to salvage any possible sensitive information from the company.

In this case, the management should have met within the company with employees who have direct access to company sensitive information. Inform everyone of possible attempt to breach information security and educate those who might have little knowledge of email spam.

Disposable documents through recyclable dumpsters need to be thoroughly managed to ensure that no possible information could be gathered through the trash. And lastly, ensure that employees understand their role regarding using and sharing sensitive information via telephone calls, email and hard documents to ensure information security in the company.

Below are methods an organization guarantees that its system is ensured:

Install Anti-Virus Software:

Guarantee that legitimate hostile to infection programming is introduced on all computers. This ought to incorporate all servers, computers, and workstations. On the off chance that workers utilize PCs at home for business utilize or to remotely get to the system, these computers ought to likewise have against virus programming introduced.

Ensure that the anti-virus software is up and coming:

Regular new PC viruses are being discharged and it is fundamental that organizations are shielded from these infections by keeping the counter infection programming a la mode. On the off chance that conceivable, organizations should take a gander at strategies whereby PCs that don't have the most avant-garde hostile to infection programming introduced are not permitted to interface with the system.

Employ a firewall to ensure systems:

As PC infections can spread by implies other than email, it is imperative that undesirable activity is hindered from entering the system by utilizing a firewall. For clients that utilization PCs for business far from the assurance of the organization's system, for example, home PCs or PCs, an individual firewall ought to be introduced to guarantee the PC is ensured.

Filter all email movement:

All approaching and active email ought to be separated for PC infections. This channel ought to preferably be at the edge of the system to anticipate PC infections. Messages with certain record connections regularly utilized by PC infections to spread themselves, for example,EXE,COM and.SCR documents, ought to likewise be kept from entering the system.

Article 2:

In my view all of these strange incidents were caused by social engineering. The main objectives of social engineering are the same as hacking .To get unauthorized access to system or information submit misrepresentation, organize interruption, modern reconnaissance, wholesale fraud, or essentially to disrupt the framework or system. Run of the mill targets incorporate phone organizations and voice-mail, enormous name partnerships and budgetary establishments, military and government offices, and doctor's facilities.

Social engineering can happen in two ways. One the physical and the psychological. First we will focus on physical setting for these attacks, the working environment, the telephone, your trash, and even on-line, in the work environment, the hacker can essentially stroll in the entryway, as in pictures.

And pretend to be a support laborer or advisor who can access the association. At that point the gatecrasher swaggers through the workplace until the point that he or she finds a couple of passwords lying around and rises out of the working with adequate data to abuse the system from home soon thereafter. Another technique to get authentication information is to just simply remain there and watch an employee type in his password.

Social Engineering by Phone

The most pervasive sort of social engineering is led by telephone. A programmer will call up and emulate somebody in a place of authority or pertinence and step by step pull data out of the client. Help desk are especially inclined to this kind of assault.

Dumpster Diving

Dumpster diving, also called as trashing, is another popular method of social engineering. A colossal measure of data can be gathered through organization dumpsters.

The LAN Times recorded the accompanying things as potential security spills in our junk: "organization telephone directories, authoritative diagrams, updates, organization strategy manuals, timetables of gatherings, occasions and excursions, framework manuals, printouts of touchy information or login names and passwords, printouts of source code, plates and tapes, organization letterhead and notice shapes, and obsolete equipment."

These sources can give a rich vein of data for the programmer. Telephone directories can give the programmers names and quantities of individuals to target and imitate. Hierarchical diagrams contain data about individuals who are in places of expert inside the association.

On-Line Social Engineering

The Internet is ripe ground for social designers hoping to collect passwords. The essential shortcoming is that numerous clients frequently put only same password on each different account.

Prevention for social engineering:

· Prepare workers/help desk people to never give out passwords or other secret information by telephone.

· Tight identification security, representative preparing, and security officers show.

· Try not to type in passwords with any other person display (or in the event that you should, do it rapidly

· Telephone (Help Desk) All workers ought to be doled out a PIN particular to enable work area to help

· Keep all waste in secured, monitor area, shred critical information, and delete attractive media.

PLEASE READ ABOVE 2 ARTICLES AND COMMENT WITH 150 WORDS ON EACH ARTICLE

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92829283
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Management Information System

Search the csu library the internet or any specific

Search the CSU library, the Internet, or any specific websites, and scan IT industry magazines to find an example of an IT project that had problems due to organizational issues. Write a paper summarizing the key stakeho ...

Question how can company protect the new emerging

Question : How can company protect the new emerging technology ventures from profit pressures of the parent organization (APA format required, Turntin check required . Minimum 250 words essay) How do companies overcome l ...

Communication and team decision makingpart 1 sharpening the

Communication and Team Decision Making Part 1: Sharpening the Team Mind: Communication and Collective Intelligence A. What are some of the possible biases and points of error that may arise in team communication systems? ...

Question provide an explanation of ifwherehow does active

Question : Provide an explanation of if/where/how does Active Directory support network security,14 pages (2,000-2,500) in APA format. Include abstract and conclusion. Do not include wikis, message boards, support forums ...

Question how companies could effectively use emerging

Question : How companies could effectively use emerging technology to win over its competitors. APA format required. 250 words essay required. The response must be typed, single spaced, must be in times new roman font (s ...

Question how customers could effectively use emerging

Question : How customers could effectively use emerging technology to win over its customers. APA format required. 250 words essay required. turntin check require. The response must be typed, single spaced, must be in ti ...

Part 1 - create an 8 slide powerpoint presentation on

Part 1 - Create an 8 slide PowerPoint presentation on foundational concepts specific to physical security. Part 2 - Write 4 pages detailing the framework for the design of an integrated data center. Assessment Instructio ...

In chapter 2 of the text - managing amp using information

In Chapter 2 of the text - Managing & Using Information Systems: A Strategic Approach, the chapter discusses why information systems experience failure often because of organizational strategy. A classic example of this ...

Review at least 4 articles on balanced scorecard and

Review at least 4 articles on Balanced Scorecard and complete the following activities: 1. Write annotated summary of each article. Use APA throughout. 2. As an IT professional, discuss how you will use Balanced Scorecar ...

Data resources management questionsq1 the dama dmbok

Data Resources Management QUESTIONS Q1. The DAMA DMBOK textbook describes the following two core activities as part of the Data Architecture management exercise: "Understanding enterprise information needs" and "Develop ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As