Premium Essay

Potential Threats

In:

Submitted By atldirrtygirl14
Words 591
Pages 3
Dr. Strayer, In analyzing your wanting to move to using mobile devices over a wireless network in order to move from one examining room to the next to document patient visits, I have come up with a plan. I have also laid out the risks you will inherit if you choose to do so. I am definitely one to take on risks if it is for the betterment of my business or career. So, along with possible risks I have also given you the proper steps to mitigate these risks during your advancement of technology. Technologies advancement has definitely positively influenced society. Unfortunately it has also engaged in a negative effect. Wireless devices have proven to be convenient, flexible, and easy to use. With the use of wireless local area networks it allow users to move from place to place within the office without losing connectivity. Mobile devices are able to synchronize data by the use of network services such as wireless email, web browsing, and internet access. Sharing data and applications with one another would definitely be made easier and convenient. With the convenience, flexibility, and ease comes the risk. The way wireless networks work is by transmitting data through radio frequencies allowing openness to intruders. Intruders can gain access to information systems and bypass firewall protection. Therefore, once data is transmitted between wireless devices, it can be intercepted or disclosed. If an intruder accesses sensitive information, they are able to launch denial of service attacks, steal identities, violate the privacy of legitimate users, insert viruses or malicious codes, and disable operations. Lastly, Mr. Strayer, in your case, with mobile devices you take the chance of losing, misplacing, or theft of your employees’ devices. Now that you are aware of the possible risks, you need to be able to take the proper precautions to mitigate

Similar Documents

Free Essay

Potential Maclicious Attacks and Threats

...Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities Shauna Video games have been around for many years. As technology progresses unfortunately so does the security risks that come with online gaming. “The number of American households which play video games is a roughly 65%.” (Source 2) With any network organization you want to make sure that you keep on top of vulnerabilities of anything that reaches out to the internet. Computers and servers that touch the internet are ones that must be scanned. As a company you have to make sure that you configure the security settings for the operating system, internet browser and security software. As a company you also want to set personal security policies for online behavior. There also needs to be an antivirus installed on the network like Norton or Symantec which blocks threats targeting the vulnerabilities. “With the firewalls you want to configure them in the reputable internet security program to block unsolicited request communication.” (Source 1) Email server needs to be sure that spam doesn’t get through the network. The ways that spam works is unwanted email messages get solicited to a large number of recipients. “Spam should be a major concern in your infrastructure since it can be used to deliver email which can include Trojan horses, viruses, worms’ spyware and targeted attacks aimed specifically in obtaining sensitive and personal identification information...

Words: 1027 - Pages: 5

Free Essay

Identifying Potential Malicious Attacks, Threats and Vulnerabilities

...Recently the Chief Information Officer of our company Celtic Gamers Frontier Inc. (CGF) has read of an increase in the threat space regarding the electronic game industry and he is concerned with regards to our Companies overall architecture, and the risks to our Research and Development efforts and other Intellectual Property. He has tasked the company’s corporate information technology group to produce an information paper detailing the types of cyber threats and malware are being reported on the internet. They would also like the security group to give the company’s executive leadership a detailed report regarding the threats, vulnerabilities and the overall risks that may be present in our current corporate infrastructure. The security department for the organization is relatively small and short on resources so this task has been given to me to do the research and create an executive report detailing the current vulnerabilities, risks and threats and potential impact to our network should we have any security incidents. “Unfortunately, there are inherent risks to computer usage — hackers, viruses, worms, spyware, malware, unethical use of stolen passwords and credentials, unauthorized data removal by employees with USB flash drives, or servers crashing and bringing productivity to a halt” ("Cybersecurity," 2013) . The CGF network is a typical office network composed of an external firewall with an external DMZ with public use servers, and internal firewall protecting...

Words: 1563 - Pages: 7

Premium Essay

Identifying Potential Malicious Attacks, Threats and Vulnerabilities

...Identifying Potential Malicious Attacks, Threats and Vulnerabilities Brian Cox Strayer Univerity Professor Leonard Roden Networking Security Fundamentals May 03, 2016            Have you ever thought about the measures that you need to go through when protecting yourself from online threats and attacks? There are many different types of attacks and threats that can be carried out against networks and organizations. The attacks that could be carried out can cause serious damage to the company and range on a scale from very minimal to very severe data loss and data theft. It is important for companies to take every precaution available and have not only the best software for prevention of these attacks but stay on top of what the intruders, hackers, attackers are learning and how the technology is forming when they are deploying these systems on their servers, networks, and office computers that employees will use on a day to day basis. The computers each employee is using should come with a User Agreement and the do’s and do not’s when it comes to daily computer usage. This will enhance the security as each employee will understand what is acceptable and how to obtain maximum security of their signed computer. It is also advisable within the User Agreement to list out the things that are unacceptable such as plugging in your phone, downloading things from the internet, and other things that may seem harmless but could hurt the company if it was exploited by accident...

Words: 1622 - Pages: 7

Premium Essay

Sandwich Blitz

...like Sandwich Blitz is a unique business. With their offering of foods no other sandwich business has. This would be their main strength to keep the business above other shops that make sandwiches. Moving to a new city could be a strength with good opportunity for growth. This new market could open all kinds of possibilities. People like verity, with the right advertising opening in a new city could get them the exposer they need to become known nationwide. That alone could take there business to the next level. I also see one potential Weakness. In this new city sometimes people are hesitant to try new things. That could hurt them to start off in this new city. There is that possibility it may not take off in that city, just because there products they offer are not the usual in that city. The threats I see for them are the two new franchise operations that offer food and beverages similar to that of Sandwich Blitz. These threats are potentially big and would depend on a lot of things. One biggy is if one or both of these new franchises were to open in the some cities as their current franchise. That would take some business from Sandwich blitz. But if either one would open in the same neighborhood that could potentially put a big impact on their sales. Getting back to opportunity, the new competition could put a fire in their motivation. Dalman and Lei could come up with specials and use their experience in advertising to keep or even gain new customers...

Words: 288 - Pages: 2

Premium Essay

Robin Hood Case Study Analysis

... * Industry Competition (Porter’s 5-Force) * Current rivalry opportunities/ threats * Current rivalry opportunities * Robin Hood could create more outsourcing potential for the Merrymen which would increase productivity potentially. * Current rivalry threats * The sheriff. The sheriff was becoming well organized and stronger as the days went by. * He would eventually have the opportunity to take Robin Hood and his Merrymen down. * King John has spies on inside of Robin Hood’s operation. * Potential entrants opportunities/ threats * None found * Bargaining power of buyers opportunities/threats * None found * Bargaining power of supplier opportunities/ threats * None found * Substitute product opportunities/ threats * General External Environment * Economic opportunities/ threats * Economic opportunities * None found * Economic threats * They will be unable to pay shares for the take, which will leave the Merrymen in an economic downturn. * Demographic opportunities/ threats * None found * Sociocultural opportunities/ threats * None found * Political/ Legal opportunities/ threats * Political/ Legal opportunities * Overthrow the government and...

Words: 1132 - Pages: 5

Premium Essay

Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

...Categories of Computer Crimes Alan Johnson Strayer University Assignment 1 There are four general categories of computer crimes. Generally someone will target a computer to forbid that person access. This is known as your hacker. He could be a single stand-alone hacker or part of a network hacking club or group similar to some of the ones known as Anti-Sec that are affiliated with the group known as ‘Anonymous’ that hacked into some 70 mostly rural law enforcement websites throughout the United States. Then there is the hacker that uses the computer as an instrument of crime to commit such acts as theft of services, fraud and the theft of information technology that can be traded and sold on the black market. This information can damage some financial institutions for years. Many hackers use the instrument of crime to steal phone and computer services. This allows them to use the phone and have internet access free of charge until caught or shut down by officials. Pyramid schemes, lottery schemes and overseas bank fraud transactions are very popular and target your unsuspecting older new computer user that hasn’t been exposed to the criminal world of the computer crimes and they innocently respond to these online criminals with information and money that causes them to become victims of devastating financial crimes without ever leaving their homes. Other aspects of instrumental computer crimes is government sensitive information access or that of a large financial institution...

Words: 970 - Pages: 4

Premium Essay

Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

...For a better understanding of the situation in the network of the company I decided to start the analysis by the vulnerabilities that this one presents. Many of these vulnerabilities are the cause for different types of network attacks. It should be noted that while many of these vulnerabilities may be mitigated or eliminated the possibility of an attack always exists. The first vulnerability is the email server. Although very well controlled for been within the Demilitarized Zone (DMZ), this is always a vulnerability with which most companies have to deal with. This vulnerability opens the way for phishing attack. One way to mitigate this vulnerability is configuring the email server so that only authorized email may enter. This is difficult because our video game company has a large list of customers and suppliers that are in constant change. The best option is to alert users about the security measures and company policies regarding private and unknown emails. The Web and FTP server can be a not very alarming vulnerability. Because it is located in the DMZ and after the Intrusion Detection System (IDS), is unlikely to be corrupted without being detected. The location of the file servers in the network is totally unprotected against internal attacks. Any successful attack in the LAN would leave the data servers exposed. The establishment of a demilitarized zone with a completely different set of log on names and password than any other machines would give these servers better...

Words: 1141 - Pages: 5

Premium Essay

Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

...IT for Decision Makers NETWORKING AND SECURITY ISSUES Handout 1 Overview Introduction Many organizations have invested vast amount of money in computer networks, only to find out that although it is providing means of improving the efficiency and productivity of the organization but it also exposes the Organization to possible attacks and threats. Such attacks have been the most challenging issue for most network administrators and a worrying topic for administrators. Organizations need to share services resources and information but they still need to protect these from people who should not have access to them, while at the same time making those resources available to authorized users. Effective security achieves these goals. The greatest threat to computer systems and their information comes from humans, through actions that are either malicious or ignorant. When the action is malicious, some motivation or goal is generally behind the attack. For instance, the goal could be to disrupt normal business operations, thereby denying data availability and production. April 13, 2000, 3:55 P.M. Pacific time: The Web site for the Motion Pictures Association of America (MPAA) is suffering intermittent outages, and the organization suspects computer vandals are to blame. A source inside the organization, who asked not to be identified, said that the MPAA is currently “experiencing problems with their public Web site, and they suspect a denial-of-service attack...

Words: 5140 - Pages: 21

Premium Essay

Conceptualizing a Business

...for the business to take to help be successful. SWOTT analysis will help guide upper management decide on what steps the business should take. Through a thorough SWOTT analysis we will look at the external and internal trends to identify strengths, weaknesses, opportunities and threats that the company could potentially face. SWOTT Analysis In order to conduct a successful SWOTT analysis we will need to assess the market, our company, and our competition. Additionally the organization will need to review any areas that could potentially generate a loss in sales or generated revenue. The first thing we will look at to identify potential future opportunities is our strengths and weaknesses. By identifying the current strengths the organization can identify what is currently working and if there could be any enhancements to make it better. By reviewing the weaknesses of the operation will help with identifying certain areas to alleviate as well as modify to hopefully at some point move into the strength column. Next the company will want to identify any opportunity that is where a need may exist and could potentially move into a profit. As a final piece the company will look at the threats which will look at any challenge posed by a negative trend or development that could potentially lead to a decrease in profits or sales. External Factors Economic The economic external force plays a large part in the Bucceri Agency. There is a large relationship between the...

Words: 1043 - Pages: 5

Premium Essay

Stereotype

...How Stereotypes Affect Us In this video Claude Steele tells about his research on stereotype threat and the way it affects us. Each of us has social identities such as gender, age, race, sexuality etc. Stereotype threat is an experience of being in situation or doing something for which a negative stereotype about one of your identities is relevant. African American can be seen as a violent person in a neighborhood with predominantly white people or white student can be perceived as a racist in class that is predominantly nonwhite, that are some of examples of stereotype threat. Dealing with things, because of particular identity in particular place that what makes the identity real. We often have fear to be judged in terms of negative stereotype. That can make us sad and confused, but also it can affect our behavior and performance! One of experiments was related to stereotype that women are not as good in math as men. Both women and men were taking math exam sitting in one room. Women showed worse results than men. That happened, because women were worried about this stereotype (often unconsciously), so they have to put double efforts to perform under this pressure. But when before test participants were told that in this particular test everyone (men and women) do equally all the time, women get same good results as men! Same situation was with IQ test for white and black participants. Black got lower results when were told that this is a test to measure intelligence...

Words: 502 - Pages: 3

Premium Essay

Stereotype Threats

...Stereotype threats are related to mathematics, it specially affects men and women. There are two different terms that affect the outcome of performance, stereotype threat and stereotype lift. Stereotype threat is the threat that other peoples judgments about a certain groups performance will cause that group to perform in a way that confirms the negative stereotype that’s believed about that group. Stereotype lift is causes the individual to perform much better than those exposed to negative stereotypes about other groups. Stereotype threat affects math performance. Identify how and in what ways does it affect the performance because of the expectations for a women’s poor performance in math. It’s hypothesis that women will perform worse in...

Words: 965 - Pages: 4

Free Essay

Blue Print- Gene Juarez Salon

...throughout the Pacific Northwest. They provide salon and spa services. They offer hair, manicure, pedicure, skin care, massage and body care, makeup, and bridal services for women. The company also provides haircut, hair color, manicure, pedicure, and cleanse and restore facial services for men. This specific day was to evaluate their hair coloring services for women. There a quite a few potential fail points in Gene Juarez’s Service Blue Print: 1. No Parking Spots 2. Front desk 3. Reservation System Down or Appointment not made correctly 4. Wait time and Reception area 5. Bill accuracy 6. Adequate consultation 7. Cut, Color, and Style The parking situation at Gene Juarez is a potential fail point. Because of the location of the Salon being in Redmond Town Center there is a risk for being no parking spots or long waits in the parking lots. The Redmond Town Center is home to approximately 100 stores and a Microsoft location nearby. Parking is tough to find and could potentially lead to late clients or clients getting fed up and leaving altogether. Another potential fail point is the customer service given at the front desk. The Guest Service Representatives at Gene Juarez are the first (and last) people you see in your visit to the Salon. The front desk team is the heart of the business and the soul of customer service. A bad experience at the front desk could taint the whole outcome of the rest of the visit. In order for a salon or spa to run smoothly...

Words: 906 - Pages: 4

Free Essay

Case 1

...probable, reasonably possible and remote. In ASC 275-10-50-8, the definition of the term reasonably possible means that the chance of a future transaction or event occurring is more than remote but less than likely. In the case, it is believed that Danle could potentially, but not probably be liable for a percentage of recovery in the claim, so we believe Danle’s loss contingency should be reasonably possible. Although it believed that the amount of potential loss was less than 50 percent of the amount claimed which is approximately $250 million, it could be material effect to the financial statements. Based on ASC 275-10-50-8, when it is reasonably possible that the estimate of the effect on the financial statements exists and the effect of the change would be material, disclosure regarding such estimate should be made when known information available before the financial statements are issued. Danle said that it did not believe that it was probable a loss would occur and could not reasonably estimate an exact amount of the potential loss. However, it is also stated in the paragraph 450-20-50-5 that disclosure is preferable to accrual when a reasonable estimate of loss cannot be made. Even though it is not probable that a liability had been incurred, disclosure also should be made for some loss contingencies for which there is a reasonable possibility that a loss may have been incurred. In conclusion, we believe that it was not appropriate for Danle to omit disclosure relating...

Words: 286 - Pages: 2

Premium Essay

Nanogene

...ISC2025-Emprendimientos Tecnológicos Tomás Charad Edgardo Gutiérrez NanoGene Technologies, Inc. •Evaluate the founder's decisions regarding the split of equity and compensation level. As potential venture investor in the company, would these decisions concern you? In my opinion the decision of splitting the equity and compensations equally for every founder was pretty logical at the moment when NanoGene was created, but as it seems through time this should have changed. As time went by roles within NanoGene were changing and also responsibilities, so compensations and salaries may have changed according to the duty the founder perform and some equivalence with market salary for the same job. As a potential venture investor the way the equity is divided within the founders is relevant, because it´s easier to negotiate and get to agreement when you treat with one or two, rather than a group of people (with common interests, but potentially different points of view). •Evaluate the size and composition of the founding team. What is the difference between being a founder and an early employee? Hint: try to understand well what it means to have "options". The founding team was too big, this is a problem when decision-making time comes, you have to agree with everybody else, so agreement tend to be simpler when less people( and opinions) are involved. In respect to the composition of the team, it is better that somebody owns at least a minimum amount more than the...

Words: 521 - Pages: 3

Free Essay

This and That

...Putting your machine at risk The Beckman Centrifuge is designed to work at high performance. Its general purposes are to be able to work in high volume labs. As you may know that with the machine spinning round for up to 12 hours there can be many complications and potential risks if a part is changed incorrectly. If any of the parts end up damaged in your machine after 3 months of you owning it, call our helpline and we will send out one of our professionals to fix your machine within 5 hours for free. If we fail to so you will be granted with a brand new machine on us. However, if you make any attempt to replace damage items or open up the machine and potentially cause more damage, then the 5 hour fixing will not apply to you. After the 3 months we can supply the parts that are needed on our website, but be warned there are many other items on the internet that may fit the machine but will not withstand the high performance needs that our machine needs. If a part is broken in the machine and you buy an uncertified part for a lot cheaper than you would normally pay the likelihood is that you are putting lives, jobs and a lot of money at stake. Our number to call if your machine is faulty is 07453872532. We are open 24 hours 7 days a week. By putting cheap parts into your machine which are not registered as we said they may not be able to keep up with the machines high performance. Adding parts that are not registered can lead to the machine exploding, causing fires and overheating...

Words: 333 - Pages: 2