ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

Bead Bar Consultant Checkpoint

Essay by   •  February 25, 2011  •  Essay  •  300 Words (2 Pages)  •  1,177 Views

Essay Preview: Bead Bar Consultant Checkpoint

Report this essay
Page 1 of 2

What are Bead Bar’s major information security threats?

1. Poorly written software which means the software could inadvertently allow malicious code to attack data or a program without anyone’s knowledge.

2. An improperly configured system could allow someone outside of the organization access the internal system.

3. Computer viruses and worms are pieces of software that destroy data and or cause computers to become infected. Once a computer becomes infected, the computer begins to operating improperly.

4. An external beach of security is when someone outside of Bead Bar will internally attempt to access the internal system by hacking, cracking or using a script found on the internet.

5. An internal breach which is someone within Bead Bar that has the proper rights to access the system, but uses their access to do harm to the system. This person could be a former employee that their access rights have not yet been disabled or a current disgruntled employee.

A security awareness training plan for Bead Bar employees and franchises would include a plan and an education of the plan. The plan would include the proper use of passwords which would include a combination of numbers letters. Passwords are not to be obvious for example, the birthday of a user. The training plan would include that absolutely no one will ask them for their password. The plan would include the proper activities of the computer, which employees have what level of access and, how viruses and worms would be controlled.

The internet backup system that Bead Bar should use is one that will make nightly backups from the main server. Each Bead Bar will have their own records, the main server and the internet backup will have all the records. In essence there would be three copies of the data.

...

...

Download as:   txt (1.8 Kb)   pdf (50.9 Kb)   docx (9.2 Kb)  
Continue for 1 more page »
Only available on ReviewEssays.com
Citation Generator

(2011, 02). Bead Bar Consultant Checkpoint. ReviewEssays.com. Retrieved 02, 2011, from https://www.reviewessays.com/essay/Bead-Bar-Consultant-Checkpoint/43226.html

"Bead Bar Consultant Checkpoint" ReviewEssays.com. 02 2011. 2011. 02 2011 <https://www.reviewessays.com/essay/Bead-Bar-Consultant-Checkpoint/43226.html>.

"Bead Bar Consultant Checkpoint." ReviewEssays.com. ReviewEssays.com, 02 2011. Web. 02 2011. <https://www.reviewessays.com/essay/Bead-Bar-Consultant-Checkpoint/43226.html>.

"Bead Bar Consultant Checkpoint." ReviewEssays.com. 02, 2011. Accessed 02, 2011. https://www.reviewessays.com/essay/Bead-Bar-Consultant-Checkpoint/43226.html.