Question

IT Subject - System Security. Question 3 Most of the current organizations are relying on IT...

IT Subject - System Security.

Question 3

Most of the current organizations are relying on IT services to process their daily operational and business processes. However, on the other hand, some of these organizations do not fully enjoy the benefit of these IT services as intended. To a great extent, this is dependent on the availability of the services uninterrupted. The degree of availability defers from company to company. The degree of availability is normally higher and commonly found among MNC companies. On the other hand, SMEs will normally have a lower degree of availability for the users of these IT services.

Based on a particular SME/MNC company provide your answer for the followings:

(a) Elaborate in detail possible factors for 5 different types of service interruption that could occurred due to security breach in your choice of company. [10 Marks]

(b) You should provide possible solution to avoid the security breach of these 5 factors that would overcome the service interruption. [15 Marks]

0 0
Add a comment Improve this question Transcribed image text
Answer #1



A security breach means gaining Unauthorized access to computer system of others. Breaches may involve corruption of data, theft of data, etc.These are the types of service interruptions that could occur due to a security breach in an organization are:

1. Change in the system : System provide services to the organisation by use of method call in systemized manner.

System may behave in different way when attackers breach security in organisation.

2. Blocking user's account:- Attacker's may block your personal account from business. Due to this, you can't serve your work to Organisation.

3.Sending anomalies in network traffic : Attacker's may send anomalies in the network to slow down the downloading and uploading process. Uploading and downloading process is very important because sharing of information and storing is integral process of organisation. This service may stop when system is breached by the attackers.

4.Immoderate utilization of memory: Sudden increase in memory of hard disk or server memory indicates that security breach is done. It is possible by the attackers that they can block memory utilization. When memory is blocked no one can upload and download files to the server or to the hard disk.

5.Unusual browsing behavior : Attacker's may redirect you from one page to another page, once your device is breached. In this way they can't let you provide services to the organisation.

The main factors for these types of service interruptions due to security breach are:

1. Revenue Loss:- Loss in revenue is very common after security breach. Loss in data is directly proportional to the revenue of firm. The most important thing in organisation is data.

2. Loss of the design, blueprint and strategies: In some cases, hackers will also target designs, strategies, and blueprints.Losing intellectual property can impact the competitiveness of your business. Some rivals would not hesitate to take advantage of stolen information.

3. Change in the website content:- Once your device is breached. Attacker's may change the content your website. In this way you will serve to the organisation with wrong data.

4. Damage to Brand Reputation:- Once people will know that data breach is done to your organisation then, people will not purchase share stock of your organisation. They will start jump away from your organisation. Your organisation will loose brand reputation.

5. Hidden Costs:-Attacker's might play with your hidden cost information of the firm .

For instance, legal fees may come into play. Also, you may need to spend more on PR and investigations, not to mention insurance premium hikes.

Solution to avoid security breaches for the given factors are:

1. Update software on regular basis.

   Updating the software on regular basis will help you to prevent from security breach. Updating the software provides extra facility and security.

2.Use the cloud:

Use of cloud is safe now days. Sending data over cloud can prevent you from data breach. Cloud servers use various advanced encryption algorithms Which protects your data from attackers.

3. Train your employees:-

Provide extra training to your employees so that they can use organizational data safely.

4. Limit access to your most valuable data:

    Adding administrative privilege to most valuable data will provide extra security to the information. Restrictions are applied to data on the basis of category of employees. A sales department employee cannot access IT department data.

5. Bind employees to use organizational devices:-

Organisation shouldn't allow any other device in their campuses. Organisation knows that using their devices are safe. But it's not possible to safe each employee device. Employee may also breach data from their device.

Don't forget to like.

thanks by heart.

Add a comment
Know the answer?
Add Answer to:
IT Subject - System Security. Question 3 Most of the current organizations are relying on IT...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the...

    Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the marketplace? Explain through the case of Citibank. please make sure you give a unique answer (not copied one) ,Please no hand writing, and need references. This question is from ECOM 421 e-Business Strategies and Business Models course e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today are up-to-date with both the pros and cons of the internet....

  • e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today...

    e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today are up-to-date with both the pros and cons of the internet. They are aware of the opportunities and threats that are associated with the Web. Not a single traditional bank is brave enough to face investment analysts without an Internet strategy. But even a very thoughtful approach to the Web may do no good to the company/ organization. The main purpose behind launching online...

  • ABC International: Solving the Rural Barrier

         Compensation sessionABC International:   Solving the Rural BarrierSource: Thunderbird School of Global Management, A unit of the Arizona State University Knowledge Enterprise. 2015. This case was prepared by Erin Bell under the guidance and supervision of Dr. Amanda Bullough, and revised and updated by Drew Helm for the purpose of classroom discussion only, and not to indicate either effective or ineffective managementSiham sat with her family and childhood friend, Leila, in their rural village of Qabatiya, Palestine. Leila had recently returned from...

  • What an Executive Summary Is An executive summary is a specific type of document that does...

    What an Executive Summary Is An executive summary is a specific type of document that does two things: it summarizes a research article, and it offers recommendations as to how information from the article can be used. Some long reports can contain an executive summary section, as indicated in the Pearson handbook. Write a 2 pahe Executive Summary In business contexts, an executive summary is always written for a specific purpose: to explain the information in the article to a...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT