Project 1-1
Incorporating system security in a company is always an effective way of minimizes common loses brought about by system attacks. Microsoft has introduced several mechanisms for boosting computer security systems. Kulkarni, Ravindran, & Freeza (2007), various practices recommend various practices that assist in preventing systems attack by viruses. First, the server should be password protected to ensure only authenticated users access information from the company computers. The system administrator should cross check each authentication and determine its location in order to keep records of various login-in details from different clients. Second, Nishida and McCormick Company should ensure all the risks and vulnerabilities are identified in order to mitigate them in a timely manner. The company should purchase computer security software from trusted dealers since they are the most efficient.
Moreover, the company’s network security requirements should adhere to the national standards. Adherence to national standards reduces risks of multiple authentications, and frequent attacks by viruses and worms. This is an expensive method but ends up saving the company a lot of resources. The need of an authorized person using an application is extremely crucial for a company’s network security. The main security requirements for the company include: the accountability of users; confidentiality in data integration and storage; and significant security management measures (Alexander, 2008).
Computer viruses have affected a lot of companies making them lose a lot of revenues. This occurs due to the failure of an organization to use active security measures against any king of threat in their servers. Nishida and McCormick Company suffer the problem of computer viruses introduced by one of their clients. In order to prevent the viruses from spreading, the server operating systems should be hardened to prevent the viruses from attacking the main server. Moreover, the administrator should ensure the document is fully scanned and the detected viruses deleted using active antivirus software. In addition, to control the spread of the virus, the company system administrator should patch and update the windows server. In case the virus has already spread, all systems need to be formatted, and new systems installed that are virus free.
Project 2-1
The following is Nishida and McCormick Company’s study guideline for server and network administrator to use as reference while operating network systems.
Step 1-This involves creation of a system for managing user accounts, passwords, and information fed into the system. The most appropriate server system would be AQL database. The database stores user passwords and prevents hackers from accessing client’s accounts without the accepted authority (Kent & Souppaya, 2006).
Step 2- After creating the database an application for managing the database should be installed. This application keeps records of all activities from each user accounts. The server filters the activities and detects those activities capable of bringing threat to the system. Once the administrator receives the signal the activity stops immediately. This application could be used for securing the president’s home.
Step 3- The system administrator should change any web configuration file that has any security incident in the membership database. This occurs through activation of authentication of all registered users in the server.
According to Abhinav (2010), network insecurity security issues have become particularly common in most organizations. Leaders should be aware of dangers posed by information leakage since it gives competitors a chance to improve on their products. Leakage of Nishida and McCormick Company’s boats design to the outside has serious effects on the manufacturer, requiring the company to hire an experienced person in the information technology field. Moreover, the president should introduce training program to equip the staff and clients on the use of computers and information protection.
References
Abhinav. (2010). Beware of Cyber Threats in A Cyber Café. Trouble Fixers. Retrieved from:
http://www.troublefixers.com/security-tips-for-cyber-cafe-usage/
Alexander, N. (2008). Implementing Application Security with Client Application Services in
VS2008. Retrieved from:
http://www.codeproject.com/Articles/27670/Implementing-Application-Security-with-Client-Appl
Kent, K. & Souppaya, M. (2006). Guide to computer security log management. Retrieved from:
http://csrc.nist.gov/publications/nistpubs/
Kulkarni, U. R., Ravindran, S. & Freeza, R. (2007). “A Knowledge Management Success
Model. Journal of Management Information Systems. Emerald Management Reviews. 23 (3)