Bead Bar Consultant Checkpoint
By: Max • Essay • 300 Words • December 1, 2009 • 1,083 Views
Essay title: Bead Bar Consultant Checkpoint
What are Bead Bar’s major information security threats?
1. Poorly written software which means the software could inadvertently allow malicious code to attack data or a program without anyone’s knowledge.
2. An improperly configured system could allow someone outside of the organization access the internal system.
3. Computer viruses and worms are pieces of software that destroy data and or cause computers to become infected. Once a computer becomes infected, the computer begins to operating improperly.
4. An external beach of security is when someone outside of Bead Bar will internally attempt to access the internal system by hacking, cracking or using a script found on the internet.
5. An internal breach which is someone within Bead Bar that has the proper rights to access the system, but uses their access to do harm to the system. This person could be a former employee that their access rights have not yet been disabled or a current disgruntled employee.
A security awareness training plan for Bead Bar employees and