Security Posture

This essay Security Posture has a total of 1043 words and 5 pages.













Security Posture
Marvin Hugley
Sec 200 Intro To Network Security
Instructor: Q Miller
11/15/15



Security

Managing a small coffee shop you can have tons of system threats. One threat is Wi-Fi. Since your Wi-Fi is going to be public anyone can connect to it. Which means that someone can come into your shop and steal your packets or they can come into your shop and hack into your system. Once there in your system they can take all of your staff and customers information. An attacker could also put a virus on your system such as a worm. Ron Teixeira says according to a recent Symantec Threat Report, 82% of data that was either lost or stolen could have been avoided if the business followed a simple cyber security plan. One way to protect yourself from attacks are firewalls. A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. One of the biggest threats are your employees. Why? Your employees are human and because of that they make mistakes. You could also have an employee that gets mad because they didn't get the promotion they thought they deserved. Most importantly it is the employee that knows how everything works. Getting to the system wouldn't be hard for them especially if they have a key card for that area or if they are one of the people that work in that area. Having employees is always a risk. So what they do is leak out all your customers information. Your business can have Malicious threats consist of inside attacks by disgruntled or malicious employees and outside attacks by non-employees just looking to harm and disrupt an organization. Your data in your business should be encrypted. This makes it harder for the person to get and read that information. Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties (Margret Rouse).
Security
There is 55,246 Coffee shops in the United States Of America. Starbucks alone makes 10.7 billion a year. Starbucks has 16,850 stores. Starbuck is probably the number one place a attacker would attack. One reason why is because it is a big corporation. Hackers love to attack big business because it will be reported on the news, by it being reported on the news the hacker is getting publicity. Another reason why a hacker would go after Starbucks is because everyone goes there. It is a easy place to attack or be attacked. One thing you can do is use a VPN ( Virtual Private Network) A VPN, or virtual private network, is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. (Vangie Beal) . Your business might get emails with attachments. If you don't know the email address then don't open it. That email might be infected with a virus worm or malware. 'Malware' is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software. A virus is a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. The best way to protect yourself on a Windows PC is to have two accounts. Have a standard account and then have a Admin Account. Do everything on the Standard account. By doing this if you accidently click on something or download something you won't get infected. The reason for this is because it needs Admin rights to install on your pc. If you want to go to a site that your not confident in or

Read essay without registering

Donate an essay now and get the full essay emailed you




Acceptable files: .txt, .doc, .docx, .rtf

Email Address

Topics Related to Security Posture