Analysis of Weaknesses and Risks in Bell Studio Organization
Verified
Added on 2023/01/05
|13
|2691
|52
AI Summary
This report provides a detailed analysis of the weaknesses and risks in the Bell Studio organization, including data flow diagrams and system flowcharts. It also discusses the potential risks associated with these weaknesses and provides recommendations for improvement.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: BELL STUDIO BELL STUDIO Name of student Name of university Author’s note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 BELL STUDIO Table of Contents Introduction........................................................................................................2 Discussion..........................................................................................................3 Data flow diagram of payroll system..............................................................3 Data flow diagram of purchases and cash disbursements systems..............4 System flowchart of cash disbursements system..........................................5 System flowchart of payroll system................................................................6 System flowchart of purchases system.........................................................7 Weakness of the organisation........................................................................7 Risks connected with the organisation..........................................................8 Conclusion.........................................................................................................9 Bibliography.....................................................................................................11
2 BELL STUDIO Introduction In the recent times, the organisation Bell studio has been facing several problems in the business that are required to be analysed and corrected. This report provides the clear discussion of the Bell studio organisation and provide the detailed analysis of the organisation. The risks that are associated with the weaknesses of the organisation are detailed in this report along with the detailed analysis of the weaknesses of the organisation. The detailed diagram of the data flow among the purchase and cashdisbursement system is providedinthis report. A detailed diagram of the data flow in the payroll system is detailed in this report. The system flowchart of the payroll system, cash disbursement system and the purchase system isprovidedinthisreport.Lastly,thisreportconcludeswiththeappropriate conclusion for the report.
3 BELL STUDIO Discussion Data flow diagram of payroll system The initiation of the flow of the data in the payroll system starts when the employees provide the details of the working hours to the supervisors. The extensive review of the time cards is done by the supervisors for the correction of any kind issue in the time cards and if there is no issue in the time cards, then the time cards
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 BELL STUDIO are submitted to the payroll department. With the utilisation of the computer terminal that has been connected in the central payroll system that has been located in the department of the data processing, the payroll clerk then inputs the information of the time card data in the database of the organisation. the time cards are filed in the payroll department and then provides the employees pay cheques to the various supervisors for the distribution within the employees. The payroll clerk then performs thesendingoftheonecopyofthepayrollregistertotheaccountspayable department and also files one more along with the time cards in payroll department. Data flow diagram of purchases and cash disbursements systems The data flow starts when the purchasing clerk views the system of the subsidiary ledger from their respective computer terminals. If the quantity of the inventory is significantly lower than the desired amount, the vendor is selected by the clerk from valid vendor file and the digital purchase order is created. Two hard copies are printed by the clerk and one of them is sent to the vendor, one is filed within the purchasing department. The goods arrives at the receiving department and the reconciliation is done after the inspection of the goods.
5 BELL STUDIO System flowchart of cash disbursements system
6 BELL STUDIO System flowchart of payroll system
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 BELL STUDIO System flowchart of purchases system Weakness of the organisation The organisation in the present are discovering some of the weaknesses in the organisation that are required to be analysed and the proper mechanisms are requiredtobeimplementedfortheproperworkingofthesystem.Themajor problems are faced in the purchases system, cash disbursement systems, and the payrollsystemthatareconsideredtobeseveralcriticalandtheproperrisk assessment is required. The major necessity that could be considered as severe
8 BELL STUDIO along with the complexity of the system of the purchasing along with the cash disbursement has unfortunately denoted to several modifications that are executed within the system and it could lead to the numerous disruptions that are majorly operationalbythedependingonthemethodsbywhichthemajorsystemis developed and the deployment of the system has been done. Some of the particular systems of the company that could be considered as not working with the help of the modern technology and majority of these system are falling behind on the various patches that could be considered as critical for the additional expansion of the updates residing inside the system might be subjected to the risk of the security or even organisational risk. It could be observed that there is a significant weakness in the system of the organisation that could lead to the increased vulnerability within the various systems of the organisation. it could increase the threat of any kind of the external attacks that could damage the proper working of the organisation. The weaknesses could be considered as the loopholes in the system that might provide the attackers with the opportunity of the executing the various kinds of attacks on the system. This organisation conducts their business and manages the data of the organisation in the unsecured computer terminals that could be the gateway for the exploitation by the attackers. There might be situations when the attackers launch the attacks on the system of the organisation are steal the confidential data of the organisationasthereisaunsecuredsystem.Anyhackercoulddiscoverthe vulnerability easily by the utilisation of the severe methods and launch the attack. The network of the organisation does not includes the proper defence mechanisms that are essential in the securing of the network of the organisation. The additional danger might be observed as it has emerged because of the deployment of the modern technology of the preventive measures. Several kinds of resources are being consistently utilised by the company and it include the financial sector, professional sector as well as the management of the company. The data of all these sectors are required to be extensively protected and secured for the prevention of any kind of attack by the outsider on the network for gainingillegalentranceintheorganisationalnetwork. Thedataofthevarious departments of the organisation is managed in the databases that are implemented in the network of the organisation. It could be considered that there are several weaknesses in the databases. Some of the common weaknesses in the databases are the lack of the proper and strict authentication protocols that prevents any outsider by the detection of the authentication credentials of the user. The lack of the robust firewall in the network of the organisation could create the issue of the attacks on the network of the organisation with ease for the attackers. Another weakness of the company that could be exploited by the illegal users is the lack of the proper organisationalcultureamongthevariousdepartmentsoftheorganisation.The coordination among the various groups of the organisation could be exploited any competitors and create the situation of the bad environment. These are major weaknesses of the organisation that could be exploited by the malicious users with the possessing of accurate tools and the techniques. Risks connected with the organisation Therisksthatcouldbeconsideredasseverelyconnectedwiththe weaknesses of the organisation are: Sniffing attacks: majority of the hackers have been attempting the launching of the attacks in the network of the organisation and the most common attack that
9 BELL STUDIO could be executed on the network of the organisation is the sniffing attack. These attacks are not targeted towards the destruction of the working of the organisation rather these kinds of the attacks are utilised for the gaining insight regarding the weaknesses of the organisation. Redirecting of the spoofing could be considered actually redirection of some type of the link of the web to an address that could be significantly different from any other one that is used in the actual website. The hackers could gain the access in the system of the organisation using the network that has been implemented in the organisation or using the web platform and discoveranygatewaythatprovidesthecompleteaccesstothedataofthe organisation. there has been the recent discovery regarding the sniffer program that the execution of the this kind of program is significantly costly for the organisation. Any snifferindividualmajorly intends toallowhackers tostealmajorityof the informationthataresignificantlyproprietaryfromanyspecificplacewithinthe network and it includes the email discussion, business reports that are stored in the confidential location and the documents whose exposure might lead to the significant loss for the business. The hackers could possibly utilise the Trojan virus for the execution of the severe attacks on the network of the organisation and obtain the secure data easily. It has been discovered that the Trojan horses mostly comprises of the opportunity of the key logging that could be referred as the keystroke recorder for the major capturingof theinputfrom thekeyboardfrom a computer. The computers of the organisation could be extensively exploited by the insider or the employees of the organisation for launching the severe attacks on the organisation. Theinformationof theorganisationthat has beenstoredinthesystemcould severely face the specific issue and would be majorly involved in the stealing of the confidential information. Unauthorised access: This is the common kind of the attack that has to be analysed with the extra caution and implement the proper working protocols for the securing of the confidential information. In this organisation, all the departmental employees are provided with the access to the system with the proper credentials. Thecredentialscouldbecompromisedandstolenbyanyoutsiderwhocould execute the launching of the attacks on the network of the organisation. The threat of the viruses in the organisation could be severe as these computer programs could be exploited by the outsiders and damage the working of the organisation. Conclusion Therefore,itcanbeconcludedthattheorganisationisfacingseveral weaknesses in the network of the organisation that are required to be rectified and the proper security protocols are required. The initiation of the flow of the data in the payroll system starts when the employees provide the details of the working hours to the supervisors. The extensive review of the time cards is done by the supervisors for the correction of any kind issue in the time cards and if there is no issue in the time cards, then the time cards are submitted to the payroll department. The data flow starts when the purchasing clerk views the system of the subsidiary ledger from their respective computer terminals. If the quantity of the inventory is significantly lower than the desired amount, the vendor is selected by the clerk from valid vendor file and the digital purchase order is created. Two hard copies are printed by the clerk and one of them is sent to the vendor, one is filed within the purchasing department.Severalkindsofresourcesarebeingconsistentlyutilisedbythe company and it include the financial sector, professional sector as well as the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10 BELL STUDIO management of the company. The data of all these sectors are required to be extensively protected and secured for the prevention of any kind of attack by the outsider on the network for gaining illegal entrance in the organisational network. Thedataofthevariousdepartmentsoftheorganisationismanagedinthe databases that are implemented in the network of the organisation. The hackers could gain the access in the system of the organisation using the network that has been implemented in the organisation or using the web platform and discover any gateway that provides the complete access to the data of the organisation. there has been the recent discovery regarding the sniffer program that the execution of the this kind of program is significantly costly for the organisation. In this organisation, all the departmental employees are provided with the access to the system with the proper credentials. The credentials could be compromised and stolen by any outsider who could execute the launching of the attacks on the network of the organisation.
11 BELL STUDIO Bibliography AbdAllah, E.G., Hassanein, H.S. and Zulkernine, M., 2015. A survey of security attacksininformation-centricnetworking.IEEECommunicationsSurveys& Tutorials,17(3), pp.1441-1454. Atymtayeva, L., Kozhakhmet, K. and Bortsova, G., 2014. Building a knowledge base forexpertsystemininformationsecurity.InSoftcomputinginartificial intelligence(pp. 57-76). Springer, Cham. B. Kim, E., 2014. Recommendations for information security awareness training for college students.Information Management & Computer Security,22(1), pp.115-126. Elnajjar, A.E.A. and Naser, S.S.A., 2017. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm. Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds., 2016.Handbook of research on modern cryptographic solutions for computer and cyber security. IGI global. Huang,C.D.,Behara,R.S.andGoo,J.,2014.Optimalinformationsecurity investment in a Healthcare Information Exchange: An economic analysis.Decision Support Systems,61, pp.1-11. Lavenex,S.,2017.Revival:TheEuropeanisationofRefugeePolicies(2001): Between Human Rights and Internal Security. Routledge. Lebek, B., Uffen, J., Neumann, M., Hohler, B. and H. Breitner, M., 2014. Information security awareness and behavior: a theory-based literature review.Management Research Review,37(12), pp.1049-1092. Mahdi, A.O., Alhabbash, M.I. and Naser, S.S.A., 2016. An intelligent tutoring system for teaching advanced topics in information security. Montesdioca, G.P.Z. and Maçada, A.C.G., 2015. Measuring user satisfaction with information security practices.Computers & Security,48, pp.267-280. NarainSingh,A.,Gupta,M.P.andOjha,A.,2014.Identifyingfactorsof “organizational information security management”.Journal of Enterprise Information Management,27(5), pp.644-667. Posey, C., Roberts, T.L., Lowry, P.B. and Hightower, R.T., 2014. Bridging the divide: Aqualitativecomparisonofinformationsecuritythoughtpatternsbetween information security professionals and ordinary organizational insiders.Information & management,51(5), pp.551-567. Shameli-Sendi, A., Aghababaei-Barzegar, R. and Cheriet, M., 2016. Taxonomy of information security risk assessment (ISRA).Computers & Security,57, pp.14-30. Stojmenovic,I.,Wen,S.,Huang,X.andLuan,H.,2016.Anoverviewoffog computingand itssecurityissues.ConcurrencyandComputation: Practiceand Experience,28(10), pp.2991-3005. Webb, J., Ahmad, A., Maynard, S.B. and Shanks, G., 2014. A situation awareness model for information security risk management.Computers & security,44, pp.1-15.
12 BELL STUDIO Yener, A. and Ulukus, S., 2015. Wireless physical-layer security: Lessons learned from information theory.Proceedings of the IEEE,103(10), pp.1814-1825.