Wednesday, May 1, 2019

Centralized PC Security Essay Example | Topics and Well Written Essays - 1250 words

Centralized PC Security - Essay ExampleTo harbor data, security policies are required to be delineate. Contingency planning is also an essential aspect which cannot be disregarded. As per Ramesh, V.C., and Xuan Li there are three dimensions of contingency planning The first issue concerns the manipulation of multiple objectives we discuss the benefits of using fuzzy logic for handling this issue.The second issue is the consideration of the sparing cost of post-contingency corrective actions as well as the utility of discrete control actions that complicate the good example and solution of the contingency planning problem.The last issue is the need for of advanced parallel computing techniques for addressing the real time aspects of many contingency planning problems 2 Analysis of Problems ABC Corporation has twenty seven screen background workstations either connected with each other via a hub or a switch. The workstations are only workgroups as there is no domain and security policies applied in the organization except some users cave in Internet access and only the manager has a separate email account. There is no email master of ceremonies available to provide separate email addresses to employees. The separate email addresses enables instant correspondence betwixt the subordinates, hence making the communication better and cost effective. Currently the employees are using telephone for coordination which is not cost effective. Some workstations are used to store data. There is no access policy defined for the data stored in the workstations. The data is vulnerable as anyone can access it or delete it. The server is used only for providing internet access and data transfer within the network. There is no firewall installed in the network, either hardware or software which makes the data, hardware, software defenseless. There is no connectivity between the regional offices and judgement office. The manager access the financial information from the head office using the ready reckoner network. The 5 regional offices have five databases which they are maintaining individually. Immense amount of time is wasted when head office sends a CD named House types data to each regional office. The administrator copies the files available on the CD to the locally maintained database. The data is updated because the project managers have to access the plans and building specifications of the houses the company builds. The data contains all the comminuted information of the house construction material which is required. There is no backup of devices, data, workstations and server. If any workstation containing database crashes, the data go forth be lost. 2.1 Security Vulnerabilities The impact of the security breach issues is unpredictable. It can be diverted and involves human twinge as well as revenue loss for the organizations. One of the security breach took place on 21 October 2010, as per www.networksecurityedge.com The Philadelp hia Inquirer states Keystone Mercy Health excogitation and AmeriHealth Mercy Health Plan have notified 280,000 Medicaid members that their information may be at risk after a portable computer drive containing the names, addresses, and health information was lost. The last four digits of 801 members Social Security numbers were also stored on the hard drive. This incident is related to theft of the hardware devices risking 280,000 Medicaid

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.