Report: Security of ICT Systems, E-mail Monitoring for Tera Tax Agency

Verified

Added on Ā 2023/01/13

|7
|1443
|44
Report
AI Summary
This report focuses on the ICT security measures for Tera Tax, a tax agency in Australia. It explores the optimal placement of email servers, recommending on-premises solutions for enhanced control and security. The report suggests using Cacti, an open-source, web-based network monitoring tool, to monitor email and server systems, detailing its capabilities in data collection and graphical display for network performance analysis. It identifies various email attack types, including phishing and virus attacks, and emphasizes the importance of protecting against potential security risks, such as data breaches and reputational damage. The report recommends using end-to-end encryption for email and strong password management as crucial protective measures. Overall, the study underscores the significance of proactive security measures to ensure the confidentiality and availability of data for Tera Tax.
Document Page
Monitor and Administer
Security of an ICT
System
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY...................................................................................................................................3
Area to place the company's E-mail servers................................................................................3
Suggestion of program to monitor E-mail and other server systems...........................................3
Reasons of suggested program.....................................................................................................4
Reasons of E-mail attacks and from where they come................................................................4
Requirement of protection for potential security risks................................................................4
The best protect way of protecting against security risks............................................................5
CONCLUSION................................................................................................................................6
REFERENCES................................................................................................................................7
2
Document Page
INTRODUCTION
ICT security refers all those policies which measures, control as well as processes applied
by companies to make confidentiality and availability of data (Joo, 2018). This study is based on
Tera Tax which is a Pvt Ltd tax agency of Australia. It has 4 offices around Victoria. This
present study is going to show importance of using security measures to identify E-mail attacks
and protect security risks. Further, it will also show some effective programs which monitors E-
mail and other service systems.
MAIN BODY
Area to place the company's E-mail servers
Cloud computing is becoming more popular which is making organizations able to adapt
changes in an efficient manner and being in the competition. It saves time, cost and improve
scalability. On the other hand, if we talk about on premises software than it can be said that it
refers those who are installed on a company's own servers. In the context of Tera Tax, it can be
said that on premises will be the best area to place its E-mail servers. The reason is it can offer to
organisation for the long time and it can also server their business needs (Bhardwaj and Goundar,
2017). One of the other reason is on premises are reliable and secure by which company can
control E—mails and other activities which cloud cannot. In this type, organization has
responsibility to maintain solutions as well as relevant processes.
Suggestion of program to monitor E-mail and other server systems
It is important for Tera tax to develop and makes an effective use of E-mail monitoring
programmes and software in order to protect servers as well as employees. It is also important
for this company to select the best one software and for that they require analysing each factor
and both sides positive and negative. In this context, it is suggested to company that it should use
Cacti because it ensures E-mail monitoring software. This software and programmes allow
companies to divide data collection and graphic display into discrete instance. It makes easier to
reprocess data for visual representations. In addition, it can also be said that it is a toolkit which
has several capabilities for graphical display as well as analysis network performance trends. The
main use of network performance trends is to monitor monitored metric (Copetti and et.al.,
2017).
3
Document Page
Reasons of suggested program
In the context of suggested software and monitoring program cacti, it can be said that it in
an open-source, web based network monitoring tool which is being designed as a front end
application for open-source. The main uses of this software is to graph time-series informations
of metrics. CPU load, network bandwidth utilization ate main tasks which are being performed
with this help. The main aim of suggesting this software to Tera tax is to makes it able to monitor
network traffic by polling a network switch. This software has ability to handle more than 1
users at a time with their own and personal graph set. It can also be used to configure data
collection (Kumar and et.al., 2017). Users can extend this software or monitoring program via
any sources such as: shell scripts and executables.
Reasons of E-mail attacks and from where they come
There are several types of E-mail attacks which occur for several reasons. The main 2
reasons of E-mail attacks are uses it as a pathway to larger data breach and as a targeted data
breach of E-mail account. Some different types of E-mail attacks are:
Phishing: Attackers mainly try to test this attack and it has been successfully working. In
this context, it can be said that nowadays many people have more than 2 E-mail account and
hackers now have far wider reach in which they change IP address which is being associated
with the website. They use the same techniques as like deceptive phishing (Rooduijn and
Akkerman, 2017).
Virus: Attacking E-mail through virus is another way of attacking. Hackers target some
specific E-mails which is the first stage of attacking with the help of virus. After successful
target and process, virus spread across the network in short time. It has more ability to even shut
down the whole system.
Requirement of protection for potential security risks
There are several reasons as why companies and Tera tax needs to protect their systems
from potential security risks. Some reasons of protecting themselves and systems from risks
include:
It affects the entire organization: A harmful e-mails and attacks on it can affect the
entire organization and all its stakeholders. Phishing E-mails affect employees as they share
several personal as well as professional informations via it.
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
It can decrease image of the company: E-mail based attacks are increasing and putting
companies at risk. Cyber breaches affect employees, IT security staff. In this context, it can be
said that people who open up malicious E-mails are blamed in most of the cases for cyber
breach. It decreases their morale, and they leave the organization (Diaz and et.al., 2017). It
decreases image of the company and decreases productivity as well.
The best protect way of protecting against security risks
Using protected E-mail with end to end encryption: Sending E-mails with encryption
also reduces chances of E-mail attacks. If an organization send mails without encryption than it
is letting third party to read private conversations. By using end to end encryption technology,
company can encrypt all data and protect their mails against attacks and leaks (Lal, Taleb and
Dutta, 2017).
Password management: By using an authenticate and a strong password by making use
of upper case and lower case letters, special characters, Tera tax can protect their systems against
E-mail attacks
5
Document Page
CONCLUSION
From the above study, it has been summarized that E-mail monitoring software played a
vital role which help company in checking deliver ability of E-mails. It also makes able to
company to Check all types of E-mails like inbox, spam and other missing. Further, this study
has shown, importance of programs of monitoring E-mails and other server system. There is a
requirement of protection for potential security risks for managing performance in an efficient
manner.
6
Document Page
REFERENCES
Books and journals
Bhardwaj, A. and Goundar, S., 2017. Security challenges for cloud-based email infrastructure.
Network Security. 2017(11). pp.8-15.
Copetti, D. and et.al., 2017. Extensive gene tree discordance and hemiplasy shaped the genomes
of North American columnar cacti. Proceedings of the National Academy of Sciences.
114(45). pp.12003-12008.
Diaz, L.J. and et.al., 2017. The risks and liability of governing board members to address cyber
security risks in higher education. JC & UL. 43. p.49.
Joo, H.S., 2018. A Study on ICT Security Change and CPS Security System in the 4th Industry
Age. Journal of Digital Contents Society. 19(2). pp.293-300.
Kumar, A. and et.al., 2017. Importance of Cacti (Opuntia sp) and its role in dryland
management. Kalyani Publishers, New Delhi.
Lal, S., Taleb, T. and Dutta, A., 2017. NFV: Security threats and best practices. IEEE
Communications Magazine. 55(8). pp.211-217.
Rooduijn, M. and Akkerman, T., 2017. Flank attacks: Populism and left-right radicalism in
Western Europe. Party Politics. 23(3). pp.193-204.
7
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]