StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Computer System Security of the Plantain Building Company - Case Study Example

Comments (0) Cite this document
Summary
The "Computer System Security of the Plantain Building Company" paper states that the Plantain Company is not exploiting information technology to its full potential, the introduction of this report highlights the importance of the Information systems. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Computer System Security of the Plantain Building Company
Read Text Preview

Extract of sample "Computer System Security of the Plantain Building Company"

Download file to see previous pages The Information system comprises hardware and software which adds functionality to the system according to the business requirements. Human beings are required to only trigger the systems in order to contribute to business functions. (Paul, 2010)

Is it vital for Small medium enterprises to perform knowledge management tasks? Knowledge is been renowned as an economical contrivance for the organization's endurance. Small-medium enterprises often face knowledge management failures resulting in business loss. (Chan, Ivy, and Chao Chee-Kwong, 2008). The impact of the effective use of Information systems is essential for business professionals, managers are other knowledge workers. The information systems facilitate the business processes and services to be completed in a professional manner. On the other hand, it also contributes to the strategic success of the business.

The plantain company is maintaining a server which is not properly employed. They have access to all types of data and possess a separate email account. Project Managers access data related to their importance. The organization requires a centralized well maintained information system, a firewall to automate their business processes and to store data in a secure way. To protect data, security policies are required to be defined. Contingency planning is also an essential aspect that cannot be disregarded. As per Ramesh, V.C., and Xuan Li there are three dimensions of contingency planning “The first issue concerns the handling of multiple objectives; we discuss the benefits of using fuzzy logic for handling this issue. The second issue is the consideration of the economic cost of post-contingency corrective actions as well as the utility of discrete control actions that complicate the modeling and solution of the contingency planning problem. The last issue is the need for of advanced parallel computing techniques for addressing the real-time aspects of many contingency planning problems;”

The Plantain building company has twenty-seven desktop workstations either connected with each other via a hub or a switch.  ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Computer System Security of the Plantain Building Company Case Study, n.d.)
Computer System Security of the Plantain Building Company Case Study. https://studentshare.org/information-technology/1743564-msc-computer-system-security-the-plantain-building-company
(Computer System Security of the Plantain Building Company Case Study)
Computer System Security of the Plantain Building Company Case Study. https://studentshare.org/information-technology/1743564-msc-computer-system-security-the-plantain-building-company.
“Computer System Security of the Plantain Building Company Case Study”. https://studentshare.org/information-technology/1743564-msc-computer-system-security-the-plantain-building-company.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer System Security of the Plantain Building Company

MSc computer system security 'Practical Windows Security'

...? Practical Windows Security Contents Introduction to windows security and vulnerabilities 3 The use of remote procedurecall 5 CVE- 2003-0352 7 Mitigating Factors 9 Security solutions 9 Conclusion 10 Reference List 12 Introduction to windows security and vulnerabilities A Windows system is prone to security threats once it is used as an internet server. The typical installation of the windows NT/2000 and other vulnerabilities makes it an easy target for attackers. This way computer networks are damaged on a regular basis. Although network security has improved and strengthened over time but so have the attackers advanced with respect to the new security solutions. The main types of attacks include Denial of Service, Trojan Horse, viruses...
9 Pages (2250 words) Essay

MSc computer system security 'RFID'

The prime advantage of RFID technology is its ease of use and minimalism. RFID replaces barcodes and is a time saving, effective and reliable alternative. That is the reason why it is adopted and deployed in multipurpose applications i.e. Supply Chain Management (SCM), Inventory Tracking, Theft Protection, Location based Services, Electronic Health Monitoring for health care systems, RFID integrated travel documents, payment systems and context-aware applications. In recent years, this technology is flourishing robustly due to its extensive usability in upcoming technologies i.e. Ubiquitous Computing, Pervasive Computing or Ambient Intelligence Solutions. RFID technology comprises of transmitters spreading electromagnetic technol...
20 Pages (5000 words) Essay

Computer Security

To understand the nature of this proverbial beast we must take a closer look at the misaligned incentives that guide the basic design and deployment of computer systems, which form a major chunk of the issue. These misguided incentives begin with what economists call a moral hazard effect which resulted in a landslide of fraud. Other incentives include consumer’s lack of prioritizing on security measures which resulted in their minimum spending on software security. This is referred to by economists as ‘The tragedy of the commons’ with consumer’s unwilling to spend on measures that did not directly benefit them. Third is the failure in privacy and prolonged regulatory issues due to poor allocation of online risks. Last is the abi...
3 Pages (750 words) Essay

Computer Security

... associated with security breaches according to cardholders, merchants, financial institutions, cost of breaches and compliance. In addition to that, it has discussed compliance issues and identified significant data breaches that have occurred in the US Retail Payment Industry. More importantly, it has recognized and discussed critical public policy related issues with an emphasis on data notification laws and the role of Federal Trade commission in tightening up security risks. The paper has also proposed a framework to upgrade the current system with the potential Chip and PIN based dynamic network procedure which will mitigate the risks associated with security matters. The author stated that information security can be guaranteed...
3 Pages (750 words) Essay

Computer security

It also provides recommendations for them. Threats to the system include the absence of multilayered protection. The ease with which the junior officer accessed the DRS is suggestive of implies threats too. The backup copies were not functional and the ease of access meant that the information is at a greater risk. There were also a number of security principles that were broken. These include the need for professionals to have knowledge about their profession, lack of responsibility by the duty manager etc. The recommendations encompass the development of multifactor authentication, a risk management system, introducing firewalls etc. Introduction One of the oldest definitions for security is that it is the process whereby steps...
6 Pages (1500 words) Essay

Computer Security

... personal information revelation behavior of millions of people to friends as well as complete strangers. Millions of people around the world use social networks like Friendster, MySpace, Facebook to communicate, find friends, dates and jobs – and in doing so they wittingly reveal highly personal information about themselves to everyone. With the burst in advertising of these social networks most of them now days encourage users to reveal highly personal information. This includes their dates of birth, cell phone numbers, addresses and highly confidential health information. The weak structural design of social networks in terms of security and access controls is cleverly concealed by a false sense of security which is aided by the current...
2 Pages (500 words) Essay

Computer Security

In this research a proposal of an offensive defense comprising of a corporate partnership with successful cyber defense software companies to provide a united front against malware is of the highest preference. The initial capital investment of free anti-virus software to users would be offset in time by added security and stability. The key to which is integration of the social subsystem in order to execute such a strategy. Computer users’ basic lack of knowledge on the dangers that lie within the network system, such as the use of weak passwords or just trusting any e-mails sent to their mailboxes actually makes it easier for hackers to gain access to the vulnerable computers over the networked systems. Presently, the web is a...
30 Pages (7500 words) Essay

Computer system Network Security

...Network Security Network security is essential component as now-a-days information is computers are connected worldwide. Information is wealth for organisations. The computer systems are linked both internally and externally. The computers receive and send unlimited information2. Information lost is regarded as financial loss. As organisations are implementing paperless media and computerizing data the need for securing data at various stages become essential. Data is stored in various modes both online and offline1. The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network The issue of computer security first arose in the 1970s as individuals began to break...
5 Pages (1250 words) Essay

Computer security

...A Report on Computer security for Oracle Inc Report of the Topic The topic reports that computer security is an essential aspect that Oracle Corporation emphasizes to the users to enable them avoid cases of hacking. Oracle Corporation is the world’s principal software company for the database enhancement. The article is significant since it exposes aspects about hacking as a grave offense that can affect the reliability and status of an individual or an organization. In March 2011, Oracle experienced this crisis when its Website was hacked by Cernaianu Manole Razvan (Lennon, 2012). This made the users of the Website encounter difficulty in accessing data from their website. Every organization should be cautions to information or sites...
1 Pages (250 words) Essay

Methods Available for Maintaining Computer System Security

... the data, and also various other methods. Security of data and information can ensure an organisation’s competitive advantage. The loss of any such data in the hands of a hacker of a competing company can ruin an organisation. It can do so by destroying consumer base and by loss of revenue. Therefore, computer security is a globally recognised need for ensuring security and integrity of data and information. References Business Link, No Date. Why data security is important. Keeping your systems and data secure. [Online] Available at: http://www.businesslink.gov.uk/bdotg/action/detail?itemId=1073791301&type=RESOURCES [Accessed August 03, 2010]. Carnegie Mellon University, 2010. Home Network Security. CERT Coordination Center. [Online...
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Computer System Security of the Plantain Building Company for FREE!

Contact Us