Hello
MBA aspirants,
Get
MBA assignments of NMIMS University solved by educational professionals at a
nominal charge.
Mail us at: help.mbaassignments@gmail.com
Call us at: 08263069601
IT Security and risk management
Dec 2020
1. A device or an application needed to track
a network or system for malicious activities or violation of policies is known
as Intrusion Detection System. Whereas, the testing that examines the security
of an organization prior to an attack on the network by a hacker is known as
penetration testing. What are the challenges and benefits of Intrusion
detection system and penetration testing for an organization in their security?
Also is it necessary to have both these strategies implemented in a single
organization? Justify your opinion.
Answer: Role of data security in organizations
Modern organisations are rich with data. Owing
to large-scale computerisation efforts, almost all processes, activities, and
interactions within the organisation are available in accessible databases.
This rich data environment has spawned a variety of software applications that
rely on the principles of decision support systems (DSS) and enable
organisations to change their competitive strategy. Company has good amount of
important data but there is no security in the company to keep that data secure
and confidential. There should be proper information system in the company and
that should be fully secured. Employees should have limited access to the data
as per their designation
2. MSME companies over the last decade have
invested in various cyber security detection and prevention policies. These
include, corporate firewalls, antivirus, malware removal tools, and many
others. In the current pandemic situation, all these investments which were
done for providing security to specific locations (office space) have proved to
be redundant. Majority of the workforce is working from home and hence a review
of these investments is being undertaken in preparation for the new normal.
Discuss the technologies and policies which would help organizations to meet
the challenges of an increasingly distributed work environment. Kindly remember
to factor in budgetary and other resource constraints which the MSME sector
faces while making your recommendations
Answer: The network
structure can be either a centralised or a distributed type of network. In a
centralised network, all the users are connected to a central server, and the
server performs the activities required for communication. Then the user
accounts and communication information are stored in this server. Almost all
the instant messaging platform and the social networking sites use a
centralised network, and this network is called the centralised server
architecture. The distributed network, on the other hand, does not perform the
functionality of a client-server architecture. In this type of network, all the
facilities are spread over the network to different clients, and a
3. Mrs. Sharma felt all was not well with her
79-year-old father who used to live alone in his hometown. When they talked on
the phone, he would tell her about a woman he met online and occasionally sent
money to via his mobile phone. Even though her father never met the woman in
person, she had gained her father’s confidence through instant messaging and
voice chats, she would ask him to send her money to feed her and her daughter.
Mrs. Sharma told her father that he was being conned, but he would not listen
and continued to send the woman money anyway. It was only after Mrs. Sharma
went to her hometown to check on her father due to ill health that she realized
the extent of the scam. She found numerous messages from the woman asking for
money, including receipts from wire transfers on her father’s phone. After
doing a little digging, Mrs. Sharma found that her father had sent the woman
more than Rs. 9,00,000 over a course of two years; practically his life’s
savings. Majority of these transaction were done by gaining access to her
father’s provident fund account. The attacker had hacked the account using the
private information gained through chat and voice messages. Unfortunately, this
is not uncommon. According to research by the Stanford Center on Longevity and
the Financial Industry Regulatory Authority’s Investor Education Foundation,
those over the age of 65 are more likely to have lost money due to a financial
scam than someone in their 40s.
a. Why are elderly frequent targets of cyber
fraud? What tactics the fraudsters use to gain access to bank accounts of
elderly?
b. What are the ways and measures to protect
people especially seniors from such attacks?
Answer: a) In the
present era, it is tough to imagine anything that we do without involving the
use of the Internet. We use the Internet for information exchange, business
transactions, entertainment purposes, social networking, etc. However, the
Internet is a double-edged sword. Along with a variety of benefits, it also has
certain security threats associated with it.
Why are the elderly frequent targets of cyber
fraud?
Not tech savvy: Most of the elderly individuals are not tech
savvy, because of the trend and convenience, they perform some basic activities
over the internet like funds transfer, bill payment, other banking activities
etc. They do not know much about suspicious transactions or how hackers can
steal the personal information with just one click. Due to lack of knowledge,
they often click or reply on suspicious message or email and later suffer
financially.
Emotional factors:
Hello
MBA aspirants,
Get
MBA assignments of NMIMS University solved by educational professionals at a
nominal charge.
Mail us at: help.mbaassignments@gmail.com
Call us at: 08263069601
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.