Give one or more measures that could be used to defend against each of the follo
ID: 3696807 • Letter: G
Question
Give one or more measures that could be used to defend against each of the following potential security threats.
1. The disk drive with the database on it fails, and all its data is lost.
2. Data entry clerks keep mistyping the item codes in orders.
3. Someone on the Internet acquires a password for one of your salespeople by monitoring Internet traffic.
4. Someone acquires a password for one of your salespeople through social engineering.
5. A purchasing department employee creates fake supplier accounts and redirects payments to a personal account
Explanation / Answer
1. Measures to defend data loss while disk failures :
BACKUP
There is nothing that can replace backup to prevent data loss and avoid expensive recovery.
Backup simply means you are keeping at least one copy of the original data, preferably not in the same disk media. Backup could often be misconstrued as the followings:
USE AN ANTI VIRUS SOFTWARE AND KEEP IT UPDATED
Anti-virus software is designed to protect your computer against malicious computer viruses, trojan and other malicious-ware. Some virus infections can delete, modify your data secretly causing your computer to crash. Most viruses nowadays spread through internet and it is a real must to have a secure Anti-Virus software with firewalls.
Be sure to update your Anti-virus software with the latest patch and signature files for maximum security. Anti-virus software without latest update is very vulnerable to attacks by newest strands of viruses which are appearing everyday
PROTECT AGAINST POWER SURGES WITH AN UPS
If your data is important, an un-interrupt power supply protects your computer and data during a power failure. The spare battery in the UPS gives you ample time to save your documents and shut down Windows properly so that you will not lose any files or damage any hardware components.
DO NOT OVER-TWEAK YOUR SYSTEM
Avoid modifying your system registry or over-clock your hardware to yield performance boost unless you're absolutely sure of what you're doing. You don't wish to fry your computer.
2. Measures to check if data entry clerk mistypes the orders :
a. Regular checkup of data entered and keep note of it and share regular feedback with clerk.
b Impose fine on clerk if he/she mitypes so that proper care should be taken while data entry.
c Peer Review mechanism should be setup so that regular audit between colleaugues can be done.
3. Measures to defend Someone on the Internet acquires a password for one of your salespeople by monitoring Internet traffic :
a. Uptodate internet security system should be installed to regular check against security threat.
b. Secure VPN token security should be given to salesperson for check on un-authorized access.
c. Lastly there should be unique password policy where a strong password should not be accessed and changed after every week.
4. Measures to defend Someone acquires a password for one of your salespeople through social engineering :
a. Train users with an effective training program that routinely uses an integrated anti-phishing tool that keeps security top of mind for users and help them recognize what a phishing email might look like.
b. Back up just in case and regularly test those backups to make sure they work.
c.Employees should be tested by having an outside party conduct a social engineering test. These kinds of tests help keep the employee on their toes and more likely to avoid the attacks.
d. Since these attacks are on the rise, a number of new defenses have been developed. AppRiver is a great Spam and Virus email filter that can block a large number of phishing exploits before they even reach the internal servers.
e. If they happen to get through, an endpoint protection system that can block the latest malware is probably your best bet at stopping the attack.
f. As a last line of defense, Cyphort has a good IDS/IPS solution that can help detect known attacks and how far they managed to get into the network by signature, behavior, and by community knowledge
5 Measures to defend a purchasing department employee creates fake supplier accounts and redirects payments to a personal account :
a. Audit process should be setup on regular checks so that proper handlings of accounts can be confirmed on daily basis.
b. Authorization process should be setup like maker-checker setup so that situation never occurs.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.