Information technology Risk
Name of the student
Name of the university
Student ID
2.1.1 Executive summary
DirectToCust is a Countrywide online trading company, and its specialty is that it sells products directly to the customers without any middlemen based in Cape Town. It currently faces some problems like theft of personal products, network policy, corrupted employees, and issues with providers, managing employees and clients or customers, the ability of IT support team and higher management authority, and a financial problem. A new IT support manager with more experience and ability is necessary for a new start to resolve the problem.
Table of Contents
2.1.3 Development of proposed solution
2.1.5 Methods of combating network-based attack
2.1.6 Impact of social engineering
2.1.7 Appropriate mechanism in implanting network access
2.1.8 Implementation of best strategy
2.1.9 Appropriate location and strategy for DMZ and firewall
2.1.2 Background
The main issues regarding IT service are that the IT support team operates without IT administration’s concern, which denotes a communication gap between the employees. The cloud service provider team of any company plays a vital role in any company’s overall growth. Still, there is also a communication gap between the team’s also the last couple of months, they are facing some firewall problems, and the company’s official website gets hacked, and the IT team took too much time to restore the website.
2.1.3 Development of proposed solution
To solve all the problems, the company needs a strong, critically managed higher management authority. Appointing a new IT to support a more qualified and experienced manager is a wise choice though some consequences. A company with a stable management author is the key to the company’s overall growth. Managing employees is a critically designed workspace, and fix the communication gap is the base requirement regarding all the ongoing issues.
2.1.4 The role of IT manager
An IT manager plays an overall role to secure any network service and its protocols. To stop unauthorized access or threats that can damage the server, IT professionals need to build a healthy physical environment that can keep the server safe and borrow some extra times (Dawber, 2019). And the IT support team has to perform an assessment every second to identify any risks to the sensitive data, and it is one of the duties of the IT manager to monitor this process.
2.1.5 Methods of combating the network-based attack
The best way of combating network-based attacks is mainly to systematize all the security protocols regarding IT services. It is also essential to monitor and keep it updated with time to time and stay aware of all the threats (Goyal et al., 2018). Also, using modern intelligent security technologies is a good habit to follow, and to monitor the network, a monitoring tool must be installed. It is the employees’ ability and awareness, which keeps it secure.
2.1.6 Impact of social engineering
So the impact of social engineering on the field of network security, as well as in the case of the corporate world, is described as the Art of Deception (Conteh and Schmick, 2016). in this case of network security, any malicious node first targets the server’s weakest link to perform or start the process. However, social engineering helps to deliver or update new techniques or technologies that would target virtual attacks and keep the network secure by providing so many wide varieties of techniques.
2.1.7 Appropriate mechanism in implanting network access
2.1.8 Implementation of the best strategy
2.1.9 Appropriate location and strategy for DMZ and firewall
(Wei and Xiao, 2020)
2.1.10 Conclusion
2.1.11 Reference
Conteh, N.Y. and Schmick, P.J., 2016. Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research, 6(23), p.31. https://www.researchgate.net/profile/Nabie_Conteh/publication/294421084_Cybersecurityrisks_vulnerabilities_and_countermeasures_to_prevent_social_engineering_attacks/links/56e2733408aebc9edb19eebc.pdf
Dawber, T., 2019. The Manager as Coach and Facilitator of Development for Employees in Information Technology (IT). International Journal of Evidence Based Coaching and Mentoring, (S13), pp.32-48. https://radar.brookes.ac.uk/radar/items/dec8fb83-73cf-4a7a-beeb-904a057d6017/1/
Goyal, P., Hossain, K.S.M., Deb, A., Tavabi, N., Bartley, N., Abeliuk, A.E., Ferrara, E. and Lerman, K., 2018. Discovering signals from web sources to predict cyber attacks. arXiv preprint arXiv:1806.03342. https://arxiv.org/abs/1806.03342
Wei, H. and Xiao, N., 2020, August. Security Protection Scheme of Brain-Like System Based on Cloud Computing Platform. In Journal of Physics: Conference Series (Vol. 1621, No. 1, p. 012096). IOP Publishing. https://iopscience.iop.org/article/10.1088/1742-6596/1621/1/012096/meta