New! Hire Essay Assignment Writer Online and Get Flat 20% Discount!!Order Now
CSI1101
AU
Edith Cowan University
Linda owns and operates a small store called Ace Hardware in Perth, Western Australia. Linda currently employs twelve individuals none of which have expertise in cyber security. Linda has discovered that automation could bring fortunes to her work and as a result implemented an IT business model where she can undercut the prices of Australia's largest hardware stores by a significant amount. Due to this change, Ace Hardware is operating so well that Linda now plans to expand into all states in Australia. The large hardware stores have a vested interest in dominating the market; therefore, they would want to obtain price lists, supplier and contact information, and any other information which would allow them to potentially regain market dominance.
Ace Hardware currently has four computers on the premises which are used to access and modify confidential data (i.e. supplier information, price lists, etc.). All four machines are using Windows 10 and Microsoft Office 2016. Three computers are laptops and operate wirelessly with no security. One computer operates through an Ethernet cable. The Internet is accessed through an ADSL 2+ connection using a D-Link G604t modem/router. None of the computers has been updated since July 2018, and there is no additional security software installed aside from the Windows 10 defaults. The computers are located in four separate offices, which are open and unlocked during business hours. As customers browse the store, they frequently walk past the employee offices located in a corner of the store.
Linda occasionally takes one of the laptops home on weekends. The most up-to-date and accurate confidential data is located on a QNAP TS-210 located in one of the offices. Should a spreadsheet or document need to be updated, employees will download the file from the QNAP and then re-upload it using WinSCP. An altered file is not usually deleted from any of the computers. Linda has recently received an anonymous email suggesting that someone may be attempting to access the confidential data.
Linda has hired you to find a solution to this very significant problem. For this assignment, you are required to research, analyse and present a security solution to Linda to be used by Ace Hardware.
Security is hard to sell to a manager, especially if they have little understanding of the area. Linda has no technical ability, and therefore she needs to be convinced that your proposed solution is appropriate for Ace Hardware.
The manager, Linda, has requested that you compile a small, succinct report addressing six to eight critical cyber security issues. In producing your solution, you should address the following requirements:
1.Why the chosen cyber security issue should be addressed immediately.
2.A detailed explanation/demonstration of how you propose to address the issue.
3.Why your chosen solution is better than alternative approaches (i.e. clearly compare/contrast your solution to alternatives).
4.A detailed breakdown of hardware, software, and training requirements necessary to implement the proposed solution. (Note: one solution may or may not involve fulfilling all the requirements, i.e. hardware, software, and training. Further, you are not required to propose the specific brand/model of any of the three breakdown elements. You are only required what hardware, software, and training components are essential in implementing your proposed solution.)
1.The report should be communicated in a manner that would be appropriate for someone with little or minimal computer technical literacy. You must ensure that you communicate your report outcomes using simple, clear language. Using complex descriptions or terminology will result in a loss of marks. Use acronyms correctly. Use analogies if it enables you to communicate the identified issue simplistically.
2.Not all solutions need to be of a technical nature. Think outside the box about what needs to be rectified within this expanding organisation.
3.You must make use of adequate in-text references throughout your entire report. Aim to use 7-10 (at least) end-text references throughout your entire report. EndNote is a useful tool to assist you with referencing.
4.Be creative in how you choose to communicate your findings. The report does not have to be a large collection of paraphrased text. Diagrams are a much more effective way of communicating an idea or concept. Tables and charts are an effective way to draw comparisons or contrast different ideas. However, all supporting material must be adequately acknowledged through referencing
15,000+ happy customers and counting!