¶ … computer used by the employee has either been compromised physically with a password cracking software (EC-Council,2010;Beaver & McClure,2010) or it has bee compromised remotely with the help of a keylogging software.A keylogger is noted by APWG (2006) as a special crimeware code that is designed with the sole intention of collecting information from the end-user terminal. The stolen information includes every strike of the keyboard which it captures.The most sensitive of the captured information are the user's credentials. Keylogger may also be used to refer to the hardware used for this purpose. The employee's password could also have been shoulder-surfed by his immediate neighbor at the workplace. This could be his coworker who manages to peek and see over his shoulder as he types in sensitive authentication information (password)
Strategy to address the issue as well as the necessary steps for resolving the issue
The strategy for addressing this threat is the adoption of a physical and software-based security system for the computer network. This is to say that the software must be secured using a very strong and effective anti-virus software. Anti-spyware must also be installed and updated frequently in order to detect any keyloggers. Physically, the computer must be checked for any physical keyloggers that may be attached to any of the USB ports, mouse and keyboard ports as well as under the keyboard. It is worth noting that keyloggers may be hidden in virtually any part of the computer system so long as there is a data bus. The issue can be resolved by instituting an appropriate information Technology policy at the workplace that discourages the installation of unapproved software and hardware (Can be disabled by the use of appropriate policies that govern administrative rights).
Case Project...
However, most companies acknowledge that the benefits of employee Internet usage outweigh the difficulties, and continue to offer Internet access to their employees, who also perceive it as a benefit. The term abuse also means different things to different people, and so, businesses must define abuse before they accuse their employees of abusing their Internet access. One writer defined abuse this way, "Internet abuse in the workplace is defined as
Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of
As many of the world's industries are faced with increasing competitive pressure and the need to continually improve their performance, employers look to new employees with computer fluency skills as an indicator that the person also has initiative to tackle difficult learning projects and master them. Initiative is very valuable in today's labor market. When combined with computer fluency and literacy, a prospective employee can add in knowledge of
It is likely that this trend will continue along the same lines as other technologies; just as telephones, the Internet, and cell phones each individually became more or less essential parts of living in Western society, the web-enabled cell phone will almost certainly be just as essential to conducting business and daily life in the next decade. For the majority of citizens in the Western -- and as increasingly the
Computer Vision Syndrome According to the Computer Desktop Encyclopedia, Computer Vision Syndrome (CVS) is "A variety of problems related to prolonged viewing of a computer screen. Short-term effects include dry eyes, blurred vision, eye fatigue and excessive tearing. Long-term effects include migraines, cataracts and visual epilepsy. Some solutions are to keep reflections and glare to a minimum and to provide a non-fluorescent, uniform light source. Special lamps are available that maintain
In some instances, policies implemented mainly as cost-effective shortcuts to network system security have cost otherwise good employees their jobs for violations of excessively restrictive network use policies. In the realm of the home computer user, it is possible to buy many new redundant or unnecessary security programs and features. Generally, appropriate network security should not interfere noticeably with either personal home computer use or computer system use in
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now