In this Unit we discussed security features for computers. This diagram represents how encryption works. The first step in encrypting a message is that the sender creates a document to be sent to the receiver. The next step is the sender uses the receiver's public key to encrypt a message. The next step in the process is that the receiver uses his/her private key to decrypt the message. Lastly the receiver can read and/or print the decrypted message. All in all our company could use this system to send messages to each other with less threat of outside intrusion. (Part B)
(Part A): As a puppy daycare we have to be aware of possible threats to our security. One possible threat would be that we have a lot of dogs running around and one could possibly run over a open computer while its user was distracted and delete all our data. To solve this threat I suggest we implement a backup system somewhere that's not at the puppy daycare. Another threat that could happen to our computer system would be our employees increasing their salaries intentionally. We will solve this problem by having the employees limited on their user accounts. Another possible threat would be someone hacking their way into our system and stealing our customers credit card information. To solve this problem we will put up several firewalls and a auto detection system if some unknown source is hacking into our system. Another possible threat could be the possablity of viruses getting into our system. Another possible threat that could possibly concern us is the likely hood of a natural disaster. We should back it up on a off site server location.
No comments:
Post a Comment