logo

Security and Risk Management: Amcor

15 Pages3379 Words242 Views
   

Added on  2021-06-18

About This Document

IS SECURITY AND RISK MANAGEMENT IS SECURITY AND RISK MANAGEMENT 1 IS Security and Risk Management: Amcor Student ID: Author’s note: Introduction 2 1. 5 types of network security devices 9 Conclusion 10 References 12 Introduction The development of the information system has resulted in forming the effective utilization of the operations and alignment of the improved activity development (Willcocks, 2013). The information system is the significant and important organized system that is eventually used for the sole purpose of any type of data

Security and Risk Management: Amcor

   Added on 2021-06-18

ShareRelated Documents
Running head: IS SECURITY AND RISK MANAGEMENTIS Security and Risk Management: AmcorName of the Student:Student ID:Name of the University:Author’s note:
Security and Risk Management: Amcor_1
1IS SECURITY AND RISK MANAGEMENTTable of ContentsIntroduction..........................................................................................................................21. Most Common Malwares and Threats.............................................................................22. Three types of network devices and their vulnerabilities................................................33. Reliability and Availability of Windows Server 2012....................................................44. Methods of Confidentiality and Integrity for email services...........................................55. Types of malware and security threats............................................................................56. Two Approaches of improving web and email servers...................................................67. Impact of human factor and organizational issues on IS security...................................88. Role of log records in security.........................................................................................89. Use of audit log for email and web server.......................................................................910. 5 types of network security devices...............................................................................9Conclusion.........................................................................................................................10References..........................................................................................................................12
Security and Risk Management: Amcor_2
2IS SECURITY AND RISK MANAGEMENTIntroductionThe development of the information system has resulted in forming the effectiveutilization of the operations and alignment of the improved activity development (Willcocks,2013). The utilization of the improved operations had helped in forming the implication of theactivities for forming the alignment of the successive alignment of the operations. Theinformation system is the significant and important organized system that is eventually used forthe sole purpose of any type of data or information operation. This information system is thecollection of several components for interaction with each other and thus producing information(Stair & Reynolds, 2013). The development of the internet based platform has resulted informing the growth of various issues and problems. Information system can only work if it isproperly connected to the internet connection. The business operations or processes of anyspecific organization become extremely easier with the proper incorporation of informationsystem within it. However, in spite of having all these advantages, there are some of thesignificant risks. This report will be outlining a brief description on the information system of anAustralian organization, Amcor Ltd. The alignment of the operations had also resulted informing the major issues and risks (Lee, 2014). The organization of the Amcor Ltd. has beenfacing the various risk factors for the development of the effective operation development.1. Most Common Malwares and Threats The most common malwares and threats that Amcor industry has to face are viruses andworms, Trojans, adware, botnets, and RAM scrappers. These are some of the most commonmalwares and threats that the ecommerce platform of Amcor would have to face. The RAMscraping is a method of stealing information from the PoS devices (Ifinedo, 2014). The PoS
Security and Risk Management: Amcor_3
3IS SECURITY AND RISK MANAGEMENTdevices can be compromised for being scarped for extracting information. The botnets worksimilarly to the spyware and it results in extracting information from the system. The deploymentof the botnets would help in backtracking the information from the system by the hackers. Theadware results in forming the automatic. The adware works as the simple advertisements thatruns as video ads and makes the system slack (Laudon & Laudon, 2016). The adware are thepopups that runs on websites and cause the issues in the deployment of the activities and usingthe advertisements for slowing the business operation. The bundles of advertisement aresponsored by the advertisers for serving as a revenue generation tool. The bugs are deployed forthe forming undesired outcomes and usually aligned for resulting in the formation of the humanerror and code (Ahmed & Hossain, 2014). The bugs can result in forming the issues of bypassinguser authentication, overriding the access, and stealing data. 2. Three types of network devices and their vulnerabilitiesThe three types of network devices in Amcor Ltd. and their vulnerabilities are givenbelow:i) Repeater: The repeater acts as a signal regenerator working at the physical layer ofAmcor Ltd. The device results in dealing with the problem of degeneration of the signal and thesignal becoming very weak with the passage of time. The repeaters receive a specific signalbefore retransmitting it. These repeaters are then utilized for extending the transmissions for thepurpose that the signal can easily cover up the longer distances over an obstruction (Power,Sharda & Burstein, 2015). Some of the most significant kinds of repeaters are present within thenetworking world of Amcor Ltd. Amongst them; telephone repeater is the most important of all.It is the amplifier within a telephone line. The second important repeater is the optical repeater.
Security and Risk Management: Amcor_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IS Security and Risk Management
|17
|4121
|102

IS Security and Risk Management: Doc
|16
|3835
|67

Malware and Threads Detection, Security and Risk Management (Atlassian)
|14
|2580
|335

IS Security and Risk Management
|14
|3517
|473

IS security and Risk Management
|16
|4607
|284

IS Security and Risk Management : Assignment
|16
|3847
|48