Monday, 12 May 2014

SECURITY LOOPHOLES


Utpal had just joined SystemX as Systems Manager. But he was a worried man looking at the current state of affairs at SystemX. As a part of assessing hardware and software requirements, it was found that out of the 364 desktops at the corporate office; more than half did not have their antivirus  software updated with recent virus signature files. Three - fourths had not changed the default e-mail password (it was the user name) and no one had installed OS patches. And one of its local mail servers seemed to be an open relay! For a fleeting moment, he wondered about the situation at the seven branch offices across the country.

SystemX used the Net extensively in dealing with its branches, customers and suppliers. Information like contract documents, marketing plans, Cheque and Draft numbers, bank account details and collection details were regularly transmitted by e-mail. Utpal’s first thought was that he would recommend that SystemX bring in a security consultant. But the budget constraints meant that his recommendation was unlikely to find favour. He was beginning to feel a bit out of depth and was wondering what he should do to ensure that SystemX’s data remained safe and secure.

Questions:
a. What security loopholes come to the fore in the situation described? How can these be
plugged?
b. What is the importance of a “security budget” in the context of the given situation?

Categories:

0 comments:

Post a Comment