.

Sunday, 10 March 2019

Network security and business

Company X is reputed to be the worlds leading manufacturer and supplier of sportswear (sports spot and vestments) and sports equipments with its central office situated in Oregon, Portland metropolitan ara. The fellowship presently accrued 16 billion US dollar cost excess revenue in 2007 only. In the year 2008, that gild is attribute to clear recruited 30,000 employees globally, while at the same time upholding its status as the sole grand crown holder of the Fortune 500 ennoble as far the state of Oregon is concerned. In this essay, the vulnerabilities experienced by the alliance shall be looked at in respect to net work at surety system which entails working towards the protection of data that is passed o0r stored through or inside the calculating machine.The community was founded in 1964 and then later re branded in 1978. The community is so well established that it does not only sell its products to a lower place its own corporation name, but it also does so t hrough its subsidiaries. In addition to this, bon ton X also owns different sports companies. In an safari to realize expansion, company X extended its services to run sell stores downstairs its name. As a result of this, the company X has slightly 19,000 retail departments in the US al adept. In the same vein, the company sells its products to rough 140 countries globally.The company has been traditionally sponsoring sportsmen and women around the globe and has very pellucid logo and slogans. The slogans used by this company unlike those of the fellow competitors, do it to the top five slogans of the 20th century, and was accredited for this by the Smithsonian Institution. In 1980, company X had hit the 50% market shargon mark in the the United States, macrocosm only 16 years old. The most young type of inventions by this company involves the production of new sensory systemls of cricket shoes which in comparison to their competitors, are 30% lighter (Bernstein, 1996).T he company seeks to maintain its vibrant market and maintains its upper hand against its competitors by producing products that are benevolent to the tastes of the materialistic y come outh. The sports wear company produces and sells assortments used in sundry and divers(prenominal) world of sports sch as basket ball, athletics, golf, American football (rugby), tennis, wrestling, skating, football and skate gameboarding, among others.The company X having become a global entity, also faces numerous problems that come with expansionism. The troubles touch on cases of workers rights in relation to the occupation sentry duty and health yields. These cases are more distributed in the developing economies than in create ones.Conversely, there are also issues about social tariff that jump on the environmental safety in relation to the production processes and wastes produced by the company. The problem also stretches to its outsourcing vendors, who together with the company have b een challenged by critics to work towards carbon neutrality.Critics have also dismissed as lies the claim by the company that it increased the salary scale of its workers by 95%. These critics secure that the company seeks to ever exploit its workers, of whom 58% are young adults time-honored between 22- 24 years, while 83% of the workers are women. Half of these workers in these companies are verbalise to have gone through their high shoal educational programs. Because few of these bulk have work related skills, critics maintain, the subsidiaries of company X are report to be employ this state of affairs to exploit their employees by issuing them very minimal wages (Mc Nab, 2004).Again, it is account that out of company Xs contract factories, 20% deal in the daily production of of the products. These factories are always bedeviled by cases of harassment and abuse (of which the company has moved in to sort out the situation by liaising with the globose Alliance in order to review the first twenty one of the most notorious factories. The company also stigmatise up the order code of conduct so as to inculcate social responsibility among the workers.Spates of continual human rights abuse nevertheless continued to persist. In Indonesia for example, 30.2% of the workers of company X are reported to have been victims of exploitation. 56% of these workers are said to have undergone verbal abuse. In about the same spectrum, 7.8% are reported to have succumbed to unwanted sexual comments, while 3.3% are said to have been abused physically. In Pakistan, the matter deteriorated to cases of squirt abuse and the conscription of child labor. For instance, in the same country, the issue came to the global attention when pictures were displayed, portraying children plain stitch football which were to be then sold by this company.Another matter that haunts this company X is the protection of information, or commonly called by the integrated world and the computer science and management as engagement hostage. Of new developments, concerns over privacy have soared, and become subject to public hysteria and debates when it was found out by security experts after conducting a inquiry in the University of Washington, that company Xs iPod sport kit had the ability to track people . Initially, the surveillance system that works through the companys iPod sports kit had been knowing to include the user (mainly the sports person) of this facility to take note of the calories that have been burned, the speed, the distance cover and the time dispensed when undertaking sports activities.The kit was fitted with a transmitter that was designed to be stuck on the shoes and the iPods transmitter. The tracking is made possible by the fact that the transmitter relays particular ID. Although the problem first seemed minuscule collectible to the fact that the information could only be annoyed from a 60 feet outside(a) shoe, yet it was found out later that more problems, it seemed would set in since the surveillance or tracking system was then fed to the Google maps (Sloot, 2003).In order to bring in ameliorations in this matter, comprehensive laws are beingness proposed so that company X and its counterparts who use these systems can be compel to beef up security into the models- a measure which these companies are ignoring. close to related speculations are also rife that the companys retailing contractors are using the RFID tags for tracking their consignments and keeping track of the stock market. This problem is hydra headed since international from the obvious fact that this may scare away potential customers, it in time has exposed the company to anti company X campaigns which have astray been activated and managed by the Caspian organization in the US.Customers will shy away from the products since the colloquy system of the company X seems to have been compromised in its CIA (confidentiality, justice and availa bility) of information security. Confidentiality calculates that only the permitted authorities access information, while integrity ensures that information stays only within the precincts of the authorized handlers. Availability on the other hand demands that those who are authorized access information are be able to so do efficiently and quickly. The external leaking in and out of confidential information can be very costly and should always be avoidedCompany X is working out to ameliorate this problem. On 5th March 2008, in Oregon, it held a meeting in which the departmental heads and subsidiary representatives met, and analyzed the extent of the vulnerability (they had already come into the board meeting, having known the nature, and the extent of the risk). As an immediate contingency, company X fixed that it was going to suspend the sale of the iPod transmitters as a measure to contribute risk avoidance.Having also become aware that there was also the jeopardy of informati on systems being invaded by hackers, (as was seen in the 31st July, 2007 when in Pakistan tens of its computers succumbed), consensus was arrived at that all computer systems in the organizations adopt the man- in- between technique by adopting the firewall computer security system that will be able to come upon the nature of the on coming information.On another front, the company X agreed that it was to globally look at its tuner networking the technology that the supports the connectivity of each computer to a specific network or networks. This does not portend coming up with a new system of networking, but bolstering the configurations and the security systems. New and stronger RAMs( Random Access Memory ) were bought and have already been set in place. This will ensure that the roiter system within the companys area of jurisdictions are very strong and very fast in detecting anomalies (Raquet and Saxe, 2005).The computer technicians in company X suggested that the leaking of t he companys secret information could be delinquent to the fact that the computer connectivity in Pakistan could have been in the open mode configuration. These technicians elaborated that open computer mode connectivity allows anyone even without the building to access information from an open mode configured computer. The situations becomes more vulnerable in the present day due to the portability of the computers (laptops and palm tops).Open mode wireless computers have a preset name that makes the computer to, on being turned on, start broadcasting packets which prompt all wireless devices within the precincts about the availability of connectivity (Albanese and Sonnenreich, 2003). However, should the computers be switched on to closed configuration, the beacon packets are no longer broadcasted by the access point.It was also discovered that although the headquarters were already filtered, yet not all of the subsidiaries were. It is an this backdrop that the computer technicians under the aegis of the companys information and technology department recommended that the radio Encryption protocol (WEP) be introduced to ward off even the most sophisticated hackers. Wireless Encryption Protocol ensure that the data that is being relayed is not in the readable format, but instead, it becomes only readable after being decoded in a backward manner on being received. This leaves the data illegible on being captured in between transition since the data is unsounded encoded. The hacker is frustrated unless in possession of the knowledge about the master key address.Conclusion.As a concept, network security is very important in the realization of a companys secret information. Good and comprehensive network security keeps secret information from flowing outwards to unwanted parties, while at the same time, enabling efficient flow of information within an enterprise. The systems of communication ( the hardware, the software and the orgware ) is also adequately pro tected.Company X would accrue higher(prenominal) returns if it enhanced all of its network security systems within its disposal.References.Albanese, J. and Sonnenreich, W. (2003). Illustrations on network security.US Mc Graw Hill.Bernstein, T. (1996). Internet security designed for business.US Wiley.Mc Nab, C. (2004). Assessment of network security.US O Rielley.Raquet, C. and Saxe, W. (2005). Advocacy and governance of business network security.US Cisco Press.Sloot, P. (2003). International conference of computational science.

No comments:

Post a Comment