Objective : Develop a solution for a business for the security solution. Written
ID: 3567428 • Letter: O
Question
Objective: Develop a solution for a business for the security solution.
Written Proposal: The written proposal gives the student the experience of submitting a written proposal for acceptance to the business owners. The proposal will no shorter than 3 pages and will cover the following in the proposal:
Introduction:In the introduction, you will evaluate what the business (any random business) does and the possible virus threats and vulnerabilities.
Improvement: In the improvement section describe in detail the recommended solution for protecting the computers of the company from viruses and intrusion. This should also cover how, when and who will up date the signature files from the software vendor. How incidents are reported and to who.
Closing: Sum up the findings of the threat assessment, how the new protection will be implemented and where it
Explanation / Answer
Consider the business scenario of an educational institution. In the educational institution might be an engineering college or a first grade college. The college will have different business scenarios in it including, maintaining of student databases, Teaching faculty databases, Non-teaching staff databases with other databases maintaining for examination departments, library, lab and so on.
All the databases and all the transactions are maintained with the help of computers of the college. Not just these databases but e college will also have the tutorials, notes, and question banks maintained in the server to help the students in their studies. Consider that any user with user name and password can access the data of maintained. All the users like principal, lecturers, and students are provided with a usernames and passwords for different purposes. That is, a student can access the database through computers of the labs to fetch the notes or tutorials. Same way a lecturer can use the computers to upload the notes and question banks.
Possible Viruses and Vulnerabilities:
As the computers are used by every user of the college, there are many chances of computers getting affected to the viruses. All the data will be stored in central servers and users with authentications can also violate the systems. The data can be hacked and the resources can be blocked. Hence, the computers will get affected by the viruses.
This will cause the data loss as well as the computers will get affected by the viruses. In such situations there will be a lot of investments getting wasted in many ways. All the data cannot be recollected in many cases. In some situations, the virus can affect a whole computer system which leads to reinvestments in computers.
As the authorization is proved by college to every member of the college, one cannot be restricted to use the computer. Following is the new solution for overcoming the above threats and vulnerabilities of the computers.
Security solution for a business:
There are no possibilities to restrict the user to use the computer in a college. Even the authenticated user can violate the rules and affect the computer. The best solution for this issue is to have a common connection to all the systems. That is, generally there will be a huge number of systems in a college and they will be independent of each other. There will be a department head who takes care of each department and all the department heads will be reporting to the Principal of the college.
Consider that all the computers of a department are interconnected and all e details about a user login must be traced out. Whenever a particular user starts using the computer with the provided username and password, the access must be recoded. The head of the department will have this trace.
Initially there will be some constraints defined which states what are vulnerabilities, whenever a user’s activities are matching with these vulnerabilities, the head of the department will be immediately informed by a pop-up message from the system which is getting affected. All the log report will be verified by the principal of the college. And in situations when the head of the department is unavailable or there is no prompt action taken by the department head after the receiving of the pop-up, within a time span the pop-up must be routed o principal saying that the system is going to get affected by virus or any kind of threats.
This process is completely automated and when there is someone to monitor through all the logs of the access of the computers, there are very less chances for the computer to get affected.
Implementation:
Uses:
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.