Your boss mentions that recently a number of employees have received calls from
ID: 3733713 • Letter: Y
Question
Your boss mentions that recently a number of employees have received calls from individuals who didn't identify themselves and asked a lot of questions about the company and its computer infrastructure. At first, he thought this was just a computer vendor who was trying to sell your company some new product, but no vendor has approached the company. He also says several strange e-mails requesting personal information have been sent to employees, and quite a few people have been seen searching your company's trash dumpsters for recyclable containers. Your boss asks what you think about all of these strange incidents. Respond and be sure to provide recommendations on what should be done about the various incidents.
Please provide atleast 300 words discussion on the following topic
Explanation / Answer
Answer:
Various incidents:
>> IT infrastructure of the company, then, first of all, the employees must be directed not to provide any information to any unknown person or through email.
>> There can be a possible danger of this guy to be a hacker. This person may have some illegal intentions of hacking the websites or the servers of the company.
>> Thus the management of the firm must ensure that the proper and adequate security is provided to all the vital and important information stored in different IT resources.
>> In fact, this message must be conveyed to each and every person who is directly or indirectly have the access to various IT resources.
>> All the employees must adhere to the security norms. In fact, all the hardware of the firms must be rechecked for possible virus infection and unauthorized attempt to access the servers.
>> The firm can install the latest software which has the capability of accessing the emails, different types of online interactions with the servers and block all the reg flagged messages or interactions.
>> In fact, there must be a strict authentication process for each employee. Whenever the employee signs in, the complete authentication process must be executed.
>> Thus the firm must develop the guidelines, standards, and process for the IT infrastructure usages and authentication. All of these policies must be implemented and monitored regularly.
>> After implementing all these processes, the attempts should be made on evaluating the efficiency of the system and routers, firewalls, and intrusion detection system must be checked for their performance time and again.
>> Reference:- Bragg. (2004). PC Communications Corporation. Tata McGraw-Hill Education. Carvalho, L. A., & Jr., O. A. (2015). Telecom Management for Call Centers: A Practical Guide. iUniverse.
>> Eric D. Knapp, J. T. (2014). Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Syngress. Fisk, N. W. (2016). Framing Internet Safety: The Governance of Youth Online. MIT Press. Gleeson, D. (2016). Stairway to Profits: 150 Business Strategies, Concepts and Ideas. Fontaine Press Pty Ltd.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.