Professional Documents
Culture Documents
[Coursework Two -
BUS200]
3/23/2011
20857870
John McGowan
Contents
Contents..........................................................................................................................2
1.0 Introduction..............................................................................................................3
2.0 The existing System.................................................................................................3
3.0 Problem within the system.......................................................................................3
3.1 Security Issues......................................................................................................3
3.2 Possible threats ....................................................................................................4
3.2.1 Introduction...................................................................................................4
3.3 Introduction..........................................................................................................4
3.4 What is a Virus ....................................................................................................4
3.5 Trojan horse:........................................................................................................4
3.6 Worms:.................................................................................................................5
3.7 Types of threats ...................................................................................................5
4.0 Legal and Ethical Considerations.............................................................................5
4.1 Personal Data........................................................................................................5
4.2 Data protection Act..............................................................................................6
5.0 Possible Solution......................................................................................................6
5.1 Introduction .............................................................................................................6
5.2 Computerisation.......................................................................................................6
5.2.1 Anti-Virus Automatic updates..........................................................................6
5.2.2 Network Firewall...............................................................................................7
6.0 Discussion with Staff ..............................................................................................8
7.0 Conclusion................................................................................................................8
7.0 Bibliography.............................................................................................................9
8.0 Appendix................................................................................................................10
Current Network Setup – Figure 1.0........................................................................11
Solution Network Setup – Figure 2.0 ......................................................................12
1.0 Introduction
This paper spectacles the research and investigation which was
carried out to find a computer related problem within the workplace.
Within this paper it will explain the existing system and how the
problem within this system affects the corporation’s security in
addition to the reputation of the community image. The research
taken out and presented within this paper is supported by well-
known concepts and theory.
This information was found out when the researcher was using the
personal computer to create a word document when a prompt
message appeared on the task bar asking the user to install a
firewall. It was brought to the researcher’s consideration to check
other security settings for any other recognized problems.
The situation was understood that the Anti-Virus program which was
installed was not formerly up to date and the definitions database
has not been updated for several months.
3.2 Possible threats
3.2.1 Introduction
The following information explains the possible threats which may
occur if no solution is taken into place. If the system was to get
infected by a virus or malware it would uncover the whole network
and be a major threat to the users plus the information currently
stored on the network database. Other systems connected to the
network will also become infected this allowing the virus to travel
and reproduce.
Figure 1.0 within the appendix shows the current system setup and
the possible threats in a clear illustration.
3.3 Introduction
There are many types of viruses which aim to steal personal
information and also cause unwanted trouble for the system and the
users. The following evidence describes in detail about certain well
known viruses and how they would affect the system.
3.6 Worms:
Dr David J. Stang the author and member of The International
Computer Security Association (2003, pg 5) describes a worm as “A
"Worm" is software which has been designed to propagate, make
additional copies of its self and perhaps to destroy or modify files. A
worm spreads copies of itself through network attached computers.
The first use of the term described a program that copied itself
benignly around a network, using otherwise unused resources on
networked machines to perform disturbed computation. Some
worms are security threats using networks to spread themselves
against the wishes of the system owners and disrupting networks by
overloading them.”
The Data Protection Act was developed to give protection and lay
down rules about how data about people can be used. The 1998 Act
covers information or data stored on a computer or an organised
paper filing system about living people.
5.1 Introduction
The following information shows possible computer solutions to
overcome the existing problems. This information is broken down
into detail which is supported by using accurate theory.
5.2 Computerisation
7.0 Conclusion
Sumit Ghosh (2002). Principles of secure network systems design. USA: Stevens
Institute Of Technology . 94.
William T. Polk (1995). Anti-virus tools and techniques for computer systems.
USA: ndc. 43.