Monday 26 March 2012

Assigment 4

In this assignment I have been asked to evaluate a network from the security threats and provide solutions. The network manager has giving me a list of all the problems


He has asked me to help resolve all these problems. There is no security at all on the network or even in the building, so therefore any one can access the information stored on the network. There is also no log on names required so therefore it is very easy to access a piece of information. There are many ways to solve these problems such as first getting security on the building by putting up gates and fences with keypads, CCTV and alarms and on the computers to protect it from people entering the system. The other way of making the information safe is by putting usernames and passwords on the server so only some people can have access to the higher levels of information so the newly employed just can’t jump into all the important information.  


There are also other problems on it like there is no restricted access on the internet so there for the employers can be sitting on websites when they should be doing work and costing the employee money. The staff are also allowed to install and remove software this is dangerous because they can destroy your computer when adding software because they could install virus or Trojans. A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner and A Trojan is a program with a secret purpose - usually malicious. Trojans enter your computer disguised as an email or free program you have downloaded from the Internet. Once installed a Trojan attempts to broadcast information to its author each time you connect to the Internet



Other problems are that the information is only backed up once a month when it should be backed up ever day and stored in a secure building incase of fires of flooding but in this case there stored in a plastic box in the same building. This can be resolved by storing them in a fire prove safe in a different building. 


The information that they store is all personal information such as purchases account numbers, bank details, customer names and addresses and purchase history. All the staff in the company has access to this information so there for you are breaking the data Protection Act 1998.

The Computer Misuse Act became law in August 1990. Under the Act hacking and the introduction of viruses are criminal offences. Universities and colleges need to co-operate to take action under the Act as the offences are likely to be committed by members of universities and colleges, students in particular, and are often perpetrated on machines or networks within the sector.


The downloads are also not monitored so there for they could be sitting all day downloading nonrelated content on the computer and also a risk of getting virus.