Analyzing Sears' IT Acquisition for Unauthorized Access Solution

Verified

Added on  2023/06/04

|4
|832
|68
Report
AI Summary
This report addresses the problem of unauthorized access to computer systems at Sears, highlighting the challenges posed by various user types and the changing corporate environment. It identifies common methods of unauthorized access, such as tailgating, compromised door keys, and weak passwords, and proposes countermeasures like implementing strong password policies, installing firewalls, and maintaining strict network control. The report emphasizes the need for a comprehensive approach to computer security, including user training and continuous monitoring, and suggests that solving the problem of unauthorized access requires ongoing investment and adaptation to evolving threats. The report also mentions that IT service acquisition is crucial for organizations to transform and achieve competitive advantage. Desklib provides access to a wide range of study materials, including past papers and solved assignments, to support students in their academic endeavors.
Document Page
Sears
PROBLEM SOLUTION
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The Problem of Unauthorized Access to Computer Systems
The problem of Access to Computer Systems has been an issue due to the unauthorized users
who need to have access to the computers. It has become even more challenging due to various
types of users who need different levels of access. For example, contactors, business partners,
the outsiders who don’t work in the business boundaries and the internal users. The business
resources have got various classification levels i.e. internal use only, or the resource is private or
even it is confidential. This requires that the diversity identity, data should be stored in different
types, for example business credentials, business contact information, related work data and
even the passwords, (Bell & LaPadula, 2013).Unauthorized access to computer systems is also
challenged by the fact that the corporate environment is continually changing which affects the
business needs, employee roles and workings, and their resource access needs.
Ways of Unauthorized Access
Tailgating
Tailgating occurs when any person follows an authorized user through the door. This brings the
whole building to risk because the user will have hold the door for an authorized user which out
of order. This can be minimized by training all authorized users on the need of security. Alarms
can be used to detect unauthorized users..
Door Keys
Keys poses a big problem because they are very hard to track when they get lost or forgotten and
if any person tends to enter the room. At this time there is a lot of danger and the only way to
prevent the unauthorized access is to ensure security of the room is to use re-core locks which
tends to be very expensive, (Forman & Zahorjan, 2014).
Document Page
This problem can be solved by the following counter measures:
Passwords
Passwords are mainly used methods of authentication which require a special attention when it
comes to password selection.
Password selection should at least follow the following:
Password should be not less than six characters in length.
They should not use words or names that are commonly expected formats like the
departments names.
They should not be reflecting to the owners of the accounts like the initials or names of
the heads of departments.
They should require a mixture of characters so that the upper and lower cases are both
used.
Installing Firewalls
Firewalls ARE dedicated system that disjoins two networks. The business should consider this
setup as mandatory on its network both the internal and the external, with them users on the
internal network are protected, (Subashini, & Kavitha, 2011).
Maintaining Network Control
Computers are regularly part of an arrangement of frameworks called network. A network
enables associated frameworks to transfer data and access information and different assets that
are accessible from frameworks associated with the system. Systems administration has made a
great and advanced method for registering. In any case, organizing has additionally risked
computer security.
For example, inside a system of a computer, singular frameworks are available to permit sharing
of data. Additionally, on the grounds that numerous individuals approach the system, there is
more possibility for permitting undesirable access, particularly through client error for instance,
through a poor utilization of passwords, (Gordon, Loeb, Lucyshyn & Richardson, R. 2010).
Document Page
The problem of unauthorized computer access won't be settled in medium-term. It will require
investment, similarly as it set aside time for computer frameworks to develop from centralized
computers to conveyed systems. In any case, meta-indexes and norms propose that there is an
approach to position get to control where it has a place - a necessary piece of a foundation now
is an appropriated framework that is all around accessible to the application level.
References
Bell, D. E., & LaPadula, L. J. (2013). Secure computer systems: Mathematical foundations (No.
MTR-2547-VOL-1). MITRE CORP BEDFORD MA.
Forman, G. H., & Zahorjan, J. (2014). The challenges of mobile computing. Computer, 27(4),
38-47.
Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Richardson, R. (2010). 2005 CSI/FBI computer
crime and security survey. Computer Security Journal, 21(3), 1.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of
cloud computing. Journal of network and computer applications, 34(1), 1-11.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]