Free Essay

Threats and Risks Associated with a Small Business Network

In:

Submitted By vhellbusch
Words 582
Pages 3
Possible threats with a small business network
Vernon Hellbusch
Coleman University

We will be looking into threats and risks that can invade a small business network.
The security of a small business network may be jeopardized in many ways.
One of the many ways might be through your e-mail, or it could be someone sabotaging internally.
Another way could be the use of hardware, such an external hard drive, thumb drive etc.
Even as simple as a cell phone could interrupt the security of your network.
We will be taking a look at ways to secure a business network from the cybercriminals that our out there trying to disrupt the security of the network systems.
1. We can do a risk assessment
2. We can educate the users
3. We can use packet filtering on the router
4. We can use antivirus software at the gateway and on the desktops
Harden your systems by getting rid of useless applications These are just a few ways on getting started on securing your network.
We can start looking at different software options that will help in securing your network.
Let’s take a look at what’s out there for free, you have Microsoft securities that you can download for Free.
You have AVG is another that is free, you have Malware Bytes also as well.
These are just a few downloads that are free that work if you’re on a tight budget and just getting started.
Also when using products like these, you want to make sure you keep track of your daily updates to make sure they’re current.
This helps in keeping the free software updated for your security. Another thing you need to worry about is how honest are the people that are working for you?
Depending on the size of your company and what business you may be in, it might be a good idea to get full back checks on each individual upon hiring.
This way you have a better idea in who you have working for you, which could make a big difference in your company’s security.
Sometimes people can become disgruntle and could retaliate against you and your company by jeopardizing your network.
So by knowing your employees background could be beneficial. Also keeping people limited to what they can access helps in keeping the threats at out.
Other types of attacks are software based attacks, malicious software like malware which are viruses and worms.
A virus will attach itself to a carrier type program and then replicate itself by spreading to other computers.
Cell phones, thumb drives are other ways people can infect a network.
A cell phone can take pictures of documents, also you can download and upload with these smart phones, as well as thumb drives.
The whole idea here is that you need to devise a plan that will help keep your network secure.
There are companies out there that will set up a security network and maintain it for a fee.
Sometimes this may be a better way to go and less headache for the business owner to do their business.
This way the business owner can focus on business growing and keeping their customers information secure, by a third party that’s trusted and insured.
In growing a business it may be less expensive to do it this way for a piece of mind, and keeping you and your customer’s information confidential, by letting the pro’s do it.
This concludes my summary.

Similar Documents

Premium Essay

Wirelesstechnologyevaluation

...Party Plates Introduction Party Plates is a business like any other business. It needs to find more efficient ways to keep business running. With the world changing drastically every day, there is a need to too keep up with those changes. Wireless technology is a vital part of the world today, especially in the world of business. Going with wireless technology can help Party Plates keep moving in the fast lane. Although there are risks involved with switching a business to wireless, there are a vast number of benefits as well. Party Plates is looking to go wireless to help their business grow. Our team has been asked to review the risks and benefits of moving to wireless technology more closely to help party plates make the right choice. The Incorporation of Wireless Technology into Party Plates There are four key advantages to incorporating wireless technology into our day-to-day activities of Party Plates: 1. Wireless technology increases efficiency of our sales and operations teams, allowing improved, faster communications and transfer of information between internal business units and the customers of Party Plates (IS4Profit UK SME/Small Business NewsLetter, 2010) (Rainer & Cegielski, 2011). 2. Wireless technology increases the time when our team is available. In a hard-wired, tethered environment, our team can only be open for communications when they are using a device that is hard wired to a network. There will be no need to carry cables or adapters...

Words: 1518 - Pages: 7

Premium Essay

Cis 341 Technical Paper

...Information Security Officer for a small pharmacy that has recently been opened in the local shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protected health information of your customers. Your supervisor has tasked you with identifying inherent risks associated with this pharmacy and establishing physical and logical access control methods that will mitigate the risks identified. 1. Firewall (1)   2. Windows 2008 Active Directory Domain  Controllers (DC) (1)  3. File Server (1)  4. Desktop computers (4) 5. Dedicated T1 Connection (1)     Write a ten to fifteen (10-15) page paper in which you: 6. Identify and analyze any potential physical vulnerabilities and threats that require consideration. 7. Identify and analyze any potential logical vulnerabilities and threats that require consideration. 8. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy. 9. Identify all potential vulnerabilities that may exist in the documented network. 10. Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy.  11. For each physical vulnerability and threat identified, choose a strategy...

Words: 520 - Pages: 3

Premium Essay

Information Security

... Why Security? The security of business information is the most important piece of a businesses infrastructure. Even in small operations, sensitive information that is essential to the business operations must be protected. "A survey by the computer security institute showed that one-third of all data breaches in just one year came at the expense of businesses with one hundred employees or less" (National Institute of Standards and Technology, 2009). What happens if you lose the most important information critical to your business operation? What would it cost your company to recover from an attack? How would you recover? These are all important questions to ask. Most likely your company's reputation would suffer, along with profits. In turn, any legal costs in relation to this security breach would be detrimental to your company’s financial health. Every business is required to have insurance, which might help with the aftermath of an attack, but it won't prevent an attack. Only information security is proactive in protecting your company's reputation and well being. Threats and Vulnerabilities The concept of threats and vulnerabilities are mentioned often in regards to computer security. A vulnerability is a weakness, or flaw, in a computer network that could be exploited. A threat is something that has the potential to cause harm to a computer, a network, or any sensitive information, thereby compromising the confidentiality...

Words: 1024 - Pages: 5

Premium Essay

Strategic Plan

...motorcycle parts and apparel store created by my good friend Mr. Brockton Gardner. Mr. Gardner is a motorcycle enthusiast, and is in tune with the motorcycle industry with a great number of people who are also enthusiasts that he’s networked with; qualities that can spell success for his website as soon as it goes live. There are many factors to consider before going live with one of those factors being security. My project proposal is a security plan that will protect Mr. Gardner, and his website, from the variety of Internet and physical security threats. This security plan is not a complete overhaul of current systems and methods used, but a plan to harden current security measures. An environmental scan conducted on the website, and Mr. Gardner, has shown that although security measures are being taken there can be some improvements to further protect his investment, and reduce the chances of a malicious attack. Internet threats aren’t the only concerns. Physical security must be considered because mobile devices, to include laptops, are lost and stolen on a daily basis. Most mobile devices carry considerable amounts of sensitive or private information giving all the more reason to protect these items. Although the site will be hosted on Yahoo.com servers, which provide their own forms of security, there are still areas outside those servers that need to be protected. This proposal will attempt to address all areas of concern to ensure Mr. Gardner, and his website...

Words: 2765 - Pages: 12

Premium Essay

Qualitative vs. Quantitative Risk Assessment

...Qualitative vs. Quantitative Risk Assessment U.S. Industries, Inc. has just won a contract with the U.S. Government to expand an existing network. U.S. Industries has never traded with the U.S. Government at this level before, thus we must gain an understanding of the qualitative and quantitative risks surrounding this project. We must also look at Operations, Audit, Compliance, Budgeting and the many other facets of business that we may be able to map out all of the components used to assign a proper risk rating to this project. Quantitative risk assessment begins when we have the ability to apply a dollar amount to a specific risk. If the project was to be finished a month early there would not be a risk because the company would save money, however at what cost? Projects that are done early usually go wrong. If the project is completed on time but not with the required security measures the company would not be in compliance with PCI DSS. By completing the project a month early using the mandatory security requirements there is no risk. Qualitative risk assessment comes into play in a different form. There are additional factors and threat vectors into our contract. We now find out that the database that once held only 1,000 records is now going to hold a range of 100,000 records to 1,000,000 records, as well as the new knowledge that multiple groups within the organization will be accessing and modifying the database daily. We have also been informed that we have...

Words: 851 - Pages: 4

Premium Essay

Cyber Security: Physical and Digital Security Measures

...Cyber Security: Physical and Digital Security Measures Abstract Due to the issues associated with cyber security and the appropriate application thereof, this paper will strive to address different cybersecurity measures that may be employed, both physically and digitally. It will identify what cyber security is, measures that may be taken, the tools needed to ensure implementation, and provide information regarding the different resources and programs necessary to work to effect greater success in the application thereof. Keywords: cyber security, physical security, digital security, security measures, definition, tools, resources Cyber Security: Physical and Digital Security Measures Introduction In spite of the increasingly prevalent use of technology in today’s digital world, many organizations find the concept of cyber security to be somewhat of a mystery. As a result of a lack of knowledge or an inability to appropriately apply that knowledge, companies like Target, Home Depot, and even Sony, among others, find themselves faced with security nightmares that could have just as easily been avoided (Yang & Jayakumar, 2014; Home Depot, 2014; Steinberg, 2014). In order to be able to approach cyber security properly, an organization must both have the knowledge necessary to implement a system designed to secure their digitized data and must have the ability to apply that knowledge within the constructs of their systems in order to ensure that a breach does not...

Words: 3485 - Pages: 14

Premium Essay

Crm and Impact

...potential threat to organization image, the establishment of an effective security measures and reassessment of organizational risk management approaches in order to cater with latest implication trend in network security. This report is based on literature review, analytical analysis of case studies, news articles magazines to highlight vulnerability and implication of malware attack to an organization, highlights the salient features of malware attack, malware attacks that can significantly hurt an enterprise information system, leading to serious functional commotions, can result into destructing the basic IT security up to identity theft, leakage of data, stealing private information, corporate information system blue prints, industrial white papers and networks break down. The only constant in the world of technology is a change, report highlights the latest trends, dimension and implication of malware attack and new critical source of threats, within the perspective of constantly changing IT world (e.g. cloud services-integration) Enterprise may not effectively device and manage malware threat and 'risk assessment processes. This report highlight the malware propagation process, malware vulnerability, the types of malware, optimistic cost effective solution in order to minimize security risk for an Enterprise information systems. This Report highlights salient features for designing an effective security policies in order to proactively addressing malware threats issues...

Words: 3648 - Pages: 15

Premium Essay

Lab 2 Ist

...Lab 2 - Align Risks, Threats, and Vulnerabilities to COBIT PO9 Risk Mgmt. Controls Part 1 4. Discuss the primary goal of the COBIT v4.1 framework. Provide a basic description of cobit. * The purpose of Control Objectives for Information and related Technology (COBIT) is to provide management and business process owners with an information technology (IT) governance model that helps in delivering value from IT and understanding and managing the risks associated with IT. COBIT helps bridge the gaps amongst business requirements, control needs and technical issues. It is a control model to meet the needs of IT governance and ensure the integrity of information and information systems. 5. Explain the major objective of the Control area (COBIT 4.1 Controls Collaboration link on the left side of the COBIT website) * “The COBIT Controls area within ISACA's Knowledge Center promotes collaboration and sharing of information, solutions and experience among COBIT users.” 6. From the COBIT Domains and Control Objectives section, list each of the types of control objectives and briefly describe them based on the descriptions on the website. * Plan and Organize – “This domain covers strategy and tactics, and concerns the identification of the way IT can best contribute to the achievement of the business objectives. The realization of the strategic vision needs to be planned, communicated and managed for different perspectives. A proper organization as well as technological...

Words: 4162 - Pages: 17

Free Essay

Computer Viruses

...much a must have in every household, school, or business cyber-criminals have moved from just being a hacker for fun into an estimated multi-million dollar world of computer crimes. New revenue streams have been realized and viruses in choice Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware. As firms of all sizes, industrial orientation, and geographic location increasingly rely on computers to operate, concerns about computer crime have also risen, in part because the practice appears to be thriving despite the concerted efforts of both the law enforcement and business communities to stop it. But computer experts and business consultants alike note that both international corporations and modest family-owned businesses can do a great deal to neutralize computer "viruses" and other manifestations of computer crime. “http://rahimimohammad.blogspot.com/p/law-for-computer-crimesand-economic.html” Many analysts believe, however, that small business owners are less likely to take steps to address the threat of computer crime than are larger firms. Indeed, many small businesses admit that they are passive about the threat because of costs associated with implementing safeguards and the perception that computer "hackers" and other threats are far more likely to pick on bigger companies. But as Tim McCollum flatly stated in Nation's Business, "companies increasingly are falling prey to...

Words: 4313 - Pages: 18

Premium Essay

Security Monitoring

...Security Monitoring In today’s business world an organization may consist of many different applications which require a certain level of risk assessment and security measures. Each application within the organization needs to be thoroughly reviewed in order to determine the associated risks and ways in which to protect against them. Another factor to be considered is that risk may vary between internal and external applications. There are many activities which can be incorporated into an organizations security plan which will help to mitigate possible risks and the loss that result from security breaches. It will be difficult for a company to achieve information security objectives without security event monitoring. Security event monitoring is derived from the general practice of monitoring activities that occur on a computer system. Security event monitoring involves recording information that represents activity and analyzing recorded information to identify and respond to questionable activities i.e.; possible security events Making Security Monitoring a Part of Your Best Security Practices. This first step would be to identify what exactly is considered questionable activity. While there is defiantly some level of activity which is considered acceptable the rules and boundaries must be clearly defined. An organization must take into consideration the applications to be used and the minimum level of security that can be used which will still...

Words: 927 - Pages: 4

Premium Essay

Wgu Fyt2 Task3

...HEALTHY BODY WELLNESS CENTER, OFFICE OF GRANTS GIVEAWAY HEALTHY BODY WELLNESS CENTER OFFICE OF GRANTS GIVEAWAY SMALL HOSPITAL GRANTS TRACKING SYSTEM INITIAL RISK ASSESSMENT PREPARED BY: WE TEST EVERYTHING LLC Jerry L. Davis, CISSP, Sr. Analyst EXECUTIVE SUMMARY .......................................................................................................... 4 1. INTRODUCTION..................................................................................................................... 7 Background ............................................................................................................................................................... 7 Purpose .....................................................................................................................................................................7 Scope ........................................................................................................................................................................7 Report Organization..................................................................................................................................................8 2. RISK ASSESSMENT APPROACH ........................................................................................ 9 2.1 Step 1: Define System Boundary ....................................................................................................................9 2.2 Step 2: Gather Information...

Words: 10420 - Pages: 42

Premium Essay

Healthy Body Wellness Center Office of Grants Giveaway Small Hospital Grants Tracking System

...HEALTHY BODY WELLNESS CENTER, OFFICE OF GRANTS GIVEAWAY HEALTHY BODY WELLNESS CENTER OFFICE OF GRANTS GIVEAWAY SMALL HOSPITAL GRANTS TRACKING SYSTEM INITIAL RISK ASSESSMENT PREPARED BY: WE TEST EVERYTHING LLC Jerry L. Davis, CISSP, Sr. Analyst EXECUTIVE SUMMARY .......................................................................................................... 4 1. INTRODUCTION..................................................................................................................... 7 Background ............................................................................................................................................................... 7 Purpose .....................................................................................................................................................................7 Scope ........................................................................................................................................................................7 Report Organization..................................................................................................................................................8 2. RISK ASSESSMENT APPROACH ........................................................................................ 9 2.1 2.2 Step 1: Define System Boundary ....................................................................................................................9 Step 2: Gather Information...

Words: 10420 - Pages: 42

Premium Essay

Ocr Risk Analysis

...HIPAA Security Standards: Guidance on Risk Analysis Introduction The Office for Civil Rights (OCR) is responsible for issuing annual guidance on the provisions in the HIPAA Security Rule.1 (45 C.F.R. §§ 164.302 – 318.) This series of guidances will assist organizations2 in identifying and implementing the most effective and appropriate administrative, physical, and technical safeguards to secure electronic protected health information (e-PHI). The guidance materials will be developed with input from stakeholders and the public, and will be updated as appropriate. We begin the series with the risk analysis requirement in § 164.308(a)(1)(ii)(A). Conducting a risk analysis is the first step in identifying and implementing safeguards that comply with and carry out the standards and implementation specifications in the Security Rule. Therefore, a risk analysis is foundational, and must be understood in detail before OCR can issue meaningful guidance that specifically addresses safeguards and technologies that will best protect electronic health information. The guidance is not intended to provide a one-size-fits-all blueprint for compliance with the risk analysis requirement. Rather, it clarifies the expectations of the Department for organizations working to meet these requirements.3 An organization should determine the most appropriate way to achieve compliance, taking into account the characteristics of the organization and its environment. We note that some of...

Words: 3309 - Pages: 14

Premium Essay

Healthy Body Wellness Center

...HEALTHY BODY WELLNESS CENTER, OFFICE OF GRANTS GIVEAWAY HEALTHY BODY WELLNESS CENTER OFFICE OF GRANTS GIVEAWAY SMALL HOSPITAL GRANTS TRACKING SYSTEM INITIAL RISK ASSESSMENT PREPARED BY: WE TEST EVERYTHING LLC Jerry L. Davis, CISSP, Sr. Analyst EXECUTIVE SUMMARY .......................................................................................................... 4 1. INTRODUCTION..................................................................................................................... 7 Background ............................................................................................................................................................... 7 Purpose .....................................................................................................................................................................7 Scope ........................................................................................................................................................................7 Report Organization..................................................................................................................................................8 2. RISK ASSESSMENT APPROACH ........................................................................................ 9 2.1 Step 1: Define System Boundary ....................................................................................................................9 2.2 Step 2: Gather Information...

Words: 10420 - Pages: 42

Premium Essay

Risk Assessment

...Information Security Management RISK ASSESMENT Information systems have long been at some risk from malicious actions or inadvertent user errors and from natural and man-made disasters. In recent years, systems have become more susceptible to these threats because computers have become more interconnected and, thus, more interdependent and accessible to a larger number of individuals. In addition, the number of individuals with computer skills is increasing, and intrusion, or “hacking,” techniques are becoming more widely known via the Internet and other media. Arisk assessment is not about creating huge amounts of paperwork , but rather about identifying sensible measures to control the risks in your workplace. You are probably already taking steps to protect your employees, but your risk assessment will help you decide whether you  have covered all you need to. Think about how accidents and ill health could happen and concentrate on real risks – those that are most likely and which will cause the most harm. For some risks, other regulations require particular control measures. Your assessment can help you identify where you need to look at certain risks and these particular control measures in more detail. These control measures do not have to be assessed separately but can be considered as part of, or an extension of, your overall risk assessment. Although all elements of the risk management cycle are important, risk assessments provide the foundation for other...

Words: 3691 - Pages: 15