StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

IT Consultant & Methodolgies - Essay Example

Cite this document
Summary
IT Consultant & Methodologies Instructor Date Introduction As many people would agree, the computer age has brought with it many advancements in many areas. The most advanced section has been storage and transfer of information courtesy of the modern information systems (Arkin, 2010)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
IT Consultant & Methodolgies
Read Text Preview

Extract of sample "IT Consultant & Methodolgies"

IT Consultant & Methodologies Introduction As many people would agree, the computer age has brought with it many advancements in many areas. The most advanced section has been storage and transfer of information courtesy of the modern information systems (Arkin, 2010). However, it is clear that this advancement has brought with it several risks. It can be noted from the daily activities that this risks continue to increase as more people continue to gain access to vital information. As much as an information system needs to be a secure system that firms or individuals can confidently store their vital information with confidence, but in reality, things happen differently (Dittrich, 2012).

The system tends to be configured in a manner that leaves loopholes that crackers might use to attack the system. These loopholes are categorized into four categories known as “attack methodologies.” Poor configuration of the firm’s network, which allows user’s ordinary access to ICMP In this type of security risk, a cracker can attack the system using methodology one. Conventionally, ICMP is created to facilitate sending of error messages when non-transient error conditions are met therefore enabling a means to query the network (Arkin, 2010).

In this case, an attacker will therefore try to exploit the open standards of the TCP/IP or OSI reference model. One common thing with ICMP is that it is a data component and it is used to build tunnels. This makes it vulnerable because everyone including potential crackers can access such information. It should also be noted that a lot of research has reached to the conclusion that ICMP is one of the key toolkits for malware. A weak password policy Using user’s name as a password might sound as a brilliant idea for ensuring users remember the passwords, but in reality, it creates a serious security risk (Afayyadh, et al., 2010). In this situation, a cracker would exploit the system using the fourth methodology.

This methodology shows how an attacker can exploit the people, their routine, and procedures they undergo within an organization. One way of attaining this level is through “social engineering” in this case a user is manipulated into giving out information by tricking them to believe that they ought to give out that information. Additionally, a cracker can achieve this objective by paying attention to the organization’s processes and procedures in the process getting to identify the existing loopholes that can be used by the cracker to attack.

In this instance, application of the third methodology is also possible. Exploitation of the configuration, individual networks, and exploit nature of design and architecture can also enable accessibility by a cracker to the organization’s system using an existing user’s account. Back doors in the firm’s website that have not been secured Today’s internet is not safe anymore for online transaction. There are more crimes being committed on the internet on a daily basis courtesy of cyber-attack or cybercrime.

A backdoor is a path to access a computer program while bypassing the security mechanism of the computer. In most cases crackers use worms to exploit such security vulnerabilities (Peterson & Turn, 1967). A website with unsecured backdoors can be very serious threat that a cracker can take advantage of to the organisation following the potential risks where a cracker can easily send malicious programs that will copy all the necessary information such as passwords and sent it the attacker. In this situation is where methodology three explains.

The availability of weaknesses in architecture, functionality, design, and configuration of individual networks poses a great danger to the firm’s information and privacy. Failure to restore the system following a reinstall with all available service packs In this type of scenario, the attack methodology likely to be deployed is methodology two. An attacker exploits the systems weaknesses in an operating system and when found they provide an avenue for malicious activities. A cracker can use this avenue to plant viruses into the system that will later be hard to detect as they are integrated into the operating system (Schwartz, 2012).

Poor briefing of staff members on matters relating to information security procedures Social engineering is a type of an attack where the attackers disguises themselves and try to persuade a legitimate user into giving out sensitive information. This mode of attack is given under the fourth methodology. Information systems are vulnerable platforms that need to be protected to the fullest. This is because a small leak in vital information such as the security codes could lead to a massive loss in a very short period.

It would be therefore advisable that the first step of introducing staff to an organisation’s information system, there should be clear set rules and policies that limit the amount of information shared or available to staff (Wilson, et al., 2009). The danger of relying on Microsoft system For this security risk attackers can exploit the firm through methodology two. In this case, the cracker or attacker usually pays attention to the operating system’s vulnerabilities to which they capitalise on to exploit and crack the operating system.

Although, this phenomenon affects all operating systems, Microsoft is one most persistent cases (Finkle, 2011). This is can be observed when the company publishes identified vulnerabilities to which unfortunately most crackers have already exploited. One recent case of security risks with Microsoft is cookie jacking, which is a way crackers are able to access the cookies from the system they use it to source passwords (Finkle, 2011). References Afayyadh, B., Thorsheim, P., Josang, A. & Klevjer, H., 2010. Improving Usability of Password Management with Standardized Password Policies.

Queendland University of Technology, 7 June, pp. 1-8. Arkin, O., 2010. Ofir Arkin, ICMP Usage in Scanning – The Complete Know How,. [Online] Available at: http://www.sys-security.com/html/papers.html [Accessed 14 March 2013]. Dittrich, D., 2012. David Dittrich, The “Tribe Flood Network” Distributed Denial of Service Attack Tool,. [Online] Available at: http://staff.washington.edu/dittrich/misc/tfn.analysis [Accessed 14 March 2013]. Finkle, J., 2011. Reuters: Microsoft latest securrity risks; cookiejacking.

[Online] Available at: http://www.reuters.com/article/2011/05/25/us-microsoft-security-idUSTRE74O86F20110525 [Accessed 14 March 2013]. Peterson, H. E. & Turn, R., 1967. "System Implications of Information Privacy".. Proceedings of the AFIPS Spring Joint Computer Conference, XXX(68), pp. 291-300. Schwartz, M. J., 2012. Microsoft Attack Surface Analyzer Catalogs Threats. [Online] Available at: http://www.informationweek.com/security/application-security/microsoft-attack-surface-analyzer-catalo/240005089 [Accessed 13 March 2013].

Wilson, M., Stine, K. & Bowen, P., 2009. Information security training requirements: a role and performance based model. NIST special publication, 14 March, pp. 1-157.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IT Consultant & Methodolgies Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
IT Consultant & Methodolgies Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/business/1470853-it-consultant-methodolgies
(IT Consultant & Methodolgies Essay Example | Topics and Well Written Essays - 750 Words)
IT Consultant & Methodolgies Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/business/1470853-it-consultant-methodolgies.
“IT Consultant & Methodolgies Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/business/1470853-it-consultant-methodolgies.
  • Cited: 0 times

CHECK THESE SAMPLES OF IT Consultant & Methodolgies

How Does the Identity of Consultants Impact Their Work

Introduction Empirical literature describes the role of consultant as both challenging and also a construct of whether an individual in this field develops a positive sense of self that is viable for the external client.... A study utilizing a sample of 79 representatives from four distinctly different consulting firms identified that the role of consultant requires four key dimensions.... This pervading professional and social attitude regarding consultancy work maintains the potential to have negative impact on the self-confidence development of consultant workers that could have ramifications for their practice activities and general attitude....
6 Pages (1500 words) Essay

E-Commerce Business Solution: Professional Management Consultants

This is part of the marketing strategy to ensure that there is initial interaction and the client is ready to adopt Professional Management consultant knowledge exchanges.... RUNNING HEAD: E-Commerce Business Solution E-Commerce Business Solution: Professional Management Consultants BY YOU YOUR SCHOOL INFO HERE YOUR TUTOR HERE DATE HERE Professional Management Consultants 1....
5 Pages (1250 words) Research Paper

How Investment in Management Consultancy Can Represent Value for an Organization

The researcher states that an organization may choose to employ management consultant's services for several reasons and they include consultants specialized expertise access and gaining advice from external sources.... When it comes to expert approach, the consultant assumes the expert's role and offers expert assistance or advice to their clients.... In this approach, the consultant is more and collaborates more with the client compared to the case of facilitative approach....
8 Pages (2000 words) Essay

The Role of a Consultant

The role of a consultant in such scenarios becomes highly visible.... In this context, a consultant or a subject matter expert plays a crucial role in identifying those gaps and focuses on the opportunities that drives improvements and augments the business performance of the client organization (Kennedy, 2007).... Hence, from the discussion it is evident that the role of a consultant is to identify the problems and make suitable recommendations to get rid of those problems (Biech, 2008)....
15 Pages (3750 words) Essay

How a management consultant identifies a potential client

In management consultant, identifying a potential client is a very important aspect.... Such a business organisation would not decline the service of a management consultant for they would be willing to achieve their organisational goals.... hen it comes to consultation work itself, it involves a management consultant team which must include senior management as well as employees at all levels.... k/links/ManConsult/) Processing Figures to be Presented by Senior Colleagues to the Client's Senior Management The figures to be presented to the client's senior management by the management consultant senior colleagues are processed....
4 Pages (1000 words) Essay

Consultancy project

Whether in restructuring, implementing systems, developing staff, changing procedure, buying new companies or bringing out new product and services, consultant is being asked to assist in a verity of ways.... There are few essential eminences that a consultant must have to provide satisfactory services.... The consultant's Scorecard.... Business Improvement Project Management Training and consultant....
2 Pages (500 words) Essay

Effect of Technology Development on Management Consulting Profession

Information technology cannot by itself change the inherent inflexible nature of its tools but any profession particularly on the management side whether it be financial management, strategic management or consultant management by using the developing trend of information technology can change its effect with respect to any organization infrastructure in such a way that they use these tools in two ways.... Information technology in private sector companies is now widely recognised as a crucial element in a company's business strategy and the reason is transparent for the way technology has boosted the growth of consultant management, is incredible....
12 Pages (3000 words) Essay

Adopting Methods and Tools for All Consulting Jobs

Throughout this essay, the notion that prescribed methods and tools can be developed for all consulting jobs will be analysed for the development of novel arguments.... The main source of data that will be used to back the assertions in the thesis statement will be in-class role… The notion that prescribed methods and tools can be developed for all consulting jobs is based on the principle that most organisations face comparable forms of problems....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us