Intruder: The suggested treatment for the attack by the external intruder such as hacker is to ensure that all communication within the organization is encrypted to deter the unauthorized access to the company data. Moreover, the organization should use antivirus to protect the company data from the attack such as Trojan horse, worm, virus etc. Compliance to policies and procedure is so vital to assure an organizational IT security.
Disgruntled Employee: Company needs to evaluate each personnel before being allowed to handle sensitive information. There is a need to conduct background check on each employee. The background check could verify potential employee criminal background, and social background. Employee should be asked to sign a confidential agreement, which states the penalties for the breach of contract.
Development a Risk Treatment Plan
To obtain required return on investment (ROI), the risks need to be managed effectively. The additional type of risks that organization needs to be addressed is as follows:
Network Security: Organization network is very vital for effective business communication. An unauthorized individual could intercept data transmitted through computer network. Thus, there is a need to develop appropriate security plan to enhance network security. The following procedures should be followed to enhance network security:
Proper documentation of the design and implementation of the network.
Firewall configuration to deter unauthorized access to the network.
Installation of antivirus software on all systems and servers.
Prevention of authorized access to the company data and network.
Always update the virus signature.
Encryption and secure connection.
Software security and security for the operating system
Use of access control and authentication
Use of Intrusion Detection System (IDS).
Use of Intrusion Prevention System (IPS).
Network routing control.
Network connection control.
Password management such as regular change of password.
Use of authentication, automatic terminal identification
Terminal logon procedure.
Physical Security: Physical security refers to the procedures of securing the company physical assets such as building, working areas, documents, systems and devices. All these items need be secured properly. Damage to any of these items could lead to damage of IT assets. The procedures to provide key security measures for company facilities are as follow:
Provision of 24-hour security with the trained security guard.
Use of physical entry control such as:
- Identification mechanisms such swipe card and identification card.
- Access authorization.
- Access restriction to be implemented on a daily basis.
- An entry and exit tracking system.
- Restricted access to data centre and server rooms
- Close 24-hour monitoring by a circuit television at critical locations such as network room, and data center.
- Restricted movement of media such as flash drives, compact disks etc.
-Paper control through authorization and physical inspection at gate passes.
-Use of fire detector system and fire suppression system
-Storing backup media that contain critical information at remote offline location.
Based on the identification of the risks on the IT assets and the methods for the treatment of these risks, the report discusses whether the Hilcorp Energy Company is actually having the appropriate policies and procedures for the treatment of these risks.
Results of the Risks Analysis
Based on the risk assessment conducted on Hilcorp Energy Company, the report uses the following criteria to assess the organizational IT security.
User Authentication and Access Controls
User authentication is the process of identifying a user's identity before being allowed to gain access to the computer system. Analysis of the method that Hilcorp Energy Company employs for the authentication practice is the use of the password-based authentication where a user is asked to input his or her password during login to gain access to the computer network. The process is that a user is asked to enter his or her password each time they want to get access to the network system. While this process is effective within the organization because the process only allows the authorized users to gain access to the computer network, however password-based network is not effective in the computer network. A sophisticated hacker could intercept the password remotely. There are situation where hackers uses the Trojan horse or worm to infect the user computer in order to steal a user password. In addition, password sent across the network could be eavesdropped and be used by an eavesdropper to impersonate the user. Moreover, password-based authentication is inconvenient because the users are asked to enter their passwords each time they want to get access.
The company access control policy is effective because it defines the operations...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now