Technical Communication Security

Document Type:Presentation

Subject Area:English

Document 1

This is devastating because most organizations nowadays depend on technology for their daily activities as a result of its competitive advantages and ease of work (Sun et al. Therefore, it is crucial for organizations to focus on data security and protection just as they dwell on marketing and human resource departments within an organization. Research Purposes The purpose of writing to you is to request for the approval of my proposal concerning the national issue of hacking facing companies. The aim is not only to help companies deduce better measures of safeguarding their documents online but to also find out why hacking has become an easy thing in this time and era. Failure to take any precautions on this issues often results to data corruption, theft of information and even manipulation of information all with the aim of satisfying some individuals selfish needs. BACKGROUND About a month ago, companies reported more than enough issues on hacking. Not that the companies are ignorant of any securities measures. In fact, most of these companies have been more than cautious in matters pertaining security. However, the improvement in technology has made it easy for hackers to easily interfere with any set passwords regardless of the lack of knowledge of the set password by the hackers. While this may sound like an inside job, a study by Cleveland 2008, shows that the issues of insecurities that the company is facing are more than likely an outside job as numerous companies are facing the same problem. As per the study, 82% of hacking is made easier these days due to operating on insecure networks and devices as well as using traditional weak links.

Sign up to view the full document!

PROBLEM TO BE INVESTIGATED Based on the background information, there are majorly five areas which need to be addressed. The first one is the primary cause of hacking that the firm is facing. Here, major questions that will be addressed will include: a. Whether the company is using weak traditional links Regular checks and upgrades of company links should be implemented. b. If the company using insecure networks and devices All insecure sites should be blocked to avoid access that may even come by mistake. c. If there is anyone who could have given out the company’s system passwords. Access security should be limited in accordance to the company management structure. In the primary methods of research, I will interview a number of qualified personnel’s in the field of information technology so that they can provide their sentiments of the study.

Sign up to view the full document!

Concerning the secondary methods, here, I will use relevant preliminary studies. This is because they have addressed the issue before, hence, may have additional knowledge that may be vital for my study. Below is a number of the preliminary studies that I will employ: Baloch, R. Ethical hacking and penetration testing guide. Radcliffe, J. August). Hacking medical devices for fun and insulin: Breaking the human SCADA system. In Black Hat Conference presentation slides (Vol. Yan, Y. B. A Common Weak-Link in the Security Chain. TIMETABLE If you accept my proposal I will be begin my research as early as 24th November to ensure that everything is done by 4th December. On this first day, what I will basically do is to come up with a list of IT specialist and contact them to arrange for a possible interview.

Sign up to view the full document!

On the 26th I will compile their report and beginning reading through the identified literature from 27th to the 30th November. Ensuring that the channel used to transfer data is secured through firewalls and encryptions reduces the risk of data loss (Sun et al. Additionally, the company should block all insecure sites with a lot of traffic that make it easy for unauthorized access into the system. By doing so, the chances of hacking will be reduced and data loss prevented. The devices used by employees should also be encrypted with passwords to ensure that only authorized employees to have access to sensitive organizational data. Sharing passwords All employees should be warned about the dangers of sharing passwords with unauthorized individuals. This will help the organization to tackle issues of sending crucial information to the wrong recipients (Sun et al.

Sign up to view the full document!

Employees should also ensure that they countercheck every email before broadcasting or sending to a recipient to prevent the cases of sending crucial information to unauthorized individuals. Summary The fastest way that an organization can lose sensitive information is through its weak links. The weak links act as pathways that unauthorized individuals use to get access to confidential information about the organization. Therefore, it is essential to ensure that the system is secured using encrypted passwords. Ethical hacking and penetration testing guide. Auerbach Publications. Bertino, E. June). Data security and privacy: concepts, approaches, and research directions. Zhang, M. Li, H. Big data security and privacy protection. Chinese Journal of Computers, 37(1), 246-258. Ohlsson, S. Data security and privacy in cloud computing. International Journal of Distributed Sensor Networks, 10(7), 190903. Wesson, K. Humphreys, T. Hacking drones.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable

Similar Documents