.

Thursday, January 24, 2019

Network security and business

Company X is reputed to be the worlds leading maker and supplier of sportswear (sports shoes and vestments) and sports equipments with its headquarters situated in Oregon, Portland metropolitan argona. The troupe presently diminishd 16 billion US horse worth excess revenue in 2007 only. In the year 2008, that troupe is credited to sire recruited 30,000 employees globally, while at the same time maintaining its locating as the sole grand crown holder of the Fortune calciferol title as far the raise of Oregon is concerned. In this essay, the vulnerabilities go through and through by the companion shall be looked at in respect to engagement security which entails working towards the protection of information that is passed o0r stored through or indoors the information processing system.The guild was founded in 1964 and then later re branded in 1978. The company is so well established that it does non only address its products under its own company name, precisely it as well does so through its subsidiaries. In addition to this, company X alike owns other sports companies. In an effort to realize expansion, company X extended its services to make pass retail stores under its name. As a result of this, the company X has approximately 19,000 retail departments in the US alone. In the same vein, the company sells its products to most 140 countries globally.The company has been traditionally sponsoring sportsmen and women around the globe and has actually distinct logo and slogans. The slogans used by this company unlike those of the swell competitors, made it to the top five slogans of the 20th century, and was accredited for this by the Smithsonian Institution. In 1980, company X had hit the 50% seeet sh ar mark in the the United States, cosmos only 16 years old. The close to recent type of inventions by this company involves the proceeds of new expressive stylels of play shoes which in comparison to their competitors, ar 30% lighter (Ber nstein, 1996).The company seeks to maintain its vibrant market and maintains its upper hand against its competitors by producing products that argon appealing to the tastes of the materialistic youth. The sports wear company produces and sells assortments used in assorted and diverse world of sports sch as basket ball, athletics, golf, American football (rugby), tennis, wrestling, skating, football and skate boarding, among others.The company X having be go on a global entity, also faces many problems that come with expansionism. The troubles touch on cases of workers rights in relation to the profession safety and health matters. These cases ar more distributed in the developing economies than in developed ones.Conversely, there atomic number 18 also issues about accessible responsibility that border on the environmental safety in relation to the production processes and wastes produced by the company. The problem also stretches to its outsourcing vendors, who together with th e company have been challenged by critics to work towards carbon neutrality.Critics have also dismissed as lies the vociferation by the company that it increased the salary scale of its workers by 95%. These critics posit that the company seeks to always exploit its workers, of whom 58% atomic number 18 teen adults aged between 22- 24 years, while 83% of the workers are women. half(prenominal) of these workers in these companies are utter to have gone through their naughty school educational programs. Because few of these people have work tie in skills, critics maintain, the subsidiaries of company X are reported to be using this state of affairs to exploit their employees by issuing them very minimal salary (Mc Nab, 2004).Again, it is reported that out of company Xs contract factories, 20% deal in the casual production of of the products. These factories are always bedeviled by cases of harassment and hollo (of which the company has moved in to sort out the situation by li aising with the Global Alliance in order to review the first twenty dollar bill one of the most nonorious factories. The company also stick up the prescribed code of conduct so as to inculcate social responsibility among the workers.Spates of continual human rights abuse nevertheless continued to persist. In Indonesia for example, 30.2% of the workers of company X are reported to have been victims of exploitation. 56% of these workers are said to have undergone verbal abuse. In about the same spectrum, 7.8% are reported to have succumbed to unwanted sexual comments, while 3.3% are said to have been abused physically. In Pakistan, the matter deteriorated to cases of child abuse and the swig of child labor. For instance, in the same country, the issue came to the global attention when pictures were displayed, depiction children knitting football which were to be then sold by this company. some other matter that haunts this company X is the protection of information, or commonly ca lled by the corporate world and the computer science and management as cyberspace security. Of recent developments, concerns over privacy have soared, and become subject to habitual furore and debates when it was found out by security experts after conducting a research in the University of Washington, that company Xs iPod sport kit had the ability to interbreed people . Initially, the surveillance system that works through the companys iPod sports kit had been designed to allow the user (mainly the sports person) of this facility to take note of the calories that have been burned, the speed, the standoffishness covered and the time dispensed when undertaking sports activities.The kit was fitted with a vector that was designed to be stuck on the shoes and the iPods transmitter. The tracking is made realiz equal by the fact that the transmitter relays particular ID. Although the problem first seemed lower-case letter due to the fact that the information could only be accessed from a 60 feet away shoe, yet it was found out later that more problems, it seemed would set in since the surveillance or tracking system was then supply to the Google maps (Sloot, 2003).In order to bring in ameliorations in this matter, comprehensive laws are being proposed so that company X and its counterparts who use these systems can be forced to beef up security into the models- a bank bill which these companies are ignoring. Some related speculations are also rife that the companys retailing contractors are using the RFID tags for tracking their consignments and keeping track of the stock market. This problem is snake in the grass headed since apart from the obvious fact that this may scare away emf customers, it still has exposed the company to anti company X campaigns which have widely been activated and managed by the Caspian organization in the US.Customers will jump away from the products since the communication system of the company X seems to have been compromised in its CIA (confidentiality, law and availability) of information security. Confidentiality portends that only the permitted authorities access information, while integrity ensures that information stays only in spite of appearance the precincts of the authorized handlers. Availability on the other hand demands that those who are authorized access information are be able to so do efficiently and quickly. The external leaking in and out of confidential information can be very costly and should always be avoidedCompany X is working out to remedy this problem. On 5th March 2008, in Oregon, it held a meeting in which the departmental heads and subsidiary representatives met, and analyzed the extent of the vulnerability (they had already come into the board meeting, having known the nature, and the extent of the risk). As an immediate contingency, company X decided that it was going to suspend the sale of the iPod transmitters as a measure to instill risk avoidance.Having also become aware that there was also the danger of information systems being invaded by hackers, (as was seen in the 31st July, 2007 when in Pakistan tens of its computers succumbed), consensus was arrived at that all computer systems in the organizations adopt the man- in- between proficiency by adopting the firewall computer security system that will be able to detect the nature of the on coming information.On another front, the company X agreed that it was to globally look at its wireless meshworking the applied science that the supports the connectivity of each computer to a specific network or networks. This does not portend coming up with a new system of networking, but bolstering the configurations and the security systems. New and stronger RAMs( Random Access Memory ) were bought and have already been set in place. This will ensure that the roiter system within the companys sweep of jurisdictions are very strong and very fast in observe anomalies (Raquet and Saxe, 2005).The compu ter technicians in company X suggested that the leaking of the companys secret information could be due to the fact that the computer connectivity in Pakistan could have been in the clean mode configuration. These technicians elaborated that open computer mode connectivity allows anyone even without the twist to access information from an open mode configured computer. The situations becomes more susceptible in the present day due to the portability of the computers (laptops and palm tops).Open mode wireless computers have a preset name that makes the computer to, on being turned on, start broadcasting packets which prompt all wireless devices within the precincts about the availability of connectivity (Albanese and Sonnenreich, 2003). However, should the computers be switched on to closed configuration, the lighthouse packets are no longer broadcasted by the access point.It was also observed that although the headquarters were already filtered, yet not all of the subsidiaries were. It is an this backdrop that the computer technicians under the aegis of the companys information and technology department recommended that the Wireless encoding Protocol (WEP) be introduced to ward off even the most modern hackers. Wireless Encryption Protocol ensure that the entropy that is being relayed is not in the readable format, but instead, it becomes only readable after being decoded in a backward manner on being received. This leaves the information unreadable on being captured in between transition since the data is still encoded. The hacker is frustrated unless in possession of the knowledge about the original address.Conclusion.As a concept, network security is very all important(predicate) in the realization of a companys secret information. Good and comprehensive network security keeps secret information from flowing outwards to unwanted parties, while at the same time, enabling efficient flow of information within an enterprise. The systems of communicati on ( the hardware, the software and the orgware ) is also adequately protected.Company X would accrue higher returns if it enhanced all of its network security systems within its disposal.References.Albanese, J. and Sonnenreich, W. (2003). Illustrations on network security.US Mc Graw Hill.Bernstein, T. (1996). Internet security designed for stemma.US Wiley.Mc Nab, C. (2004). Assessment of network security.US O Rielley.Raquet, C. and Saxe, W. (2005). Advocacy and governance of business network security.US Cisco Press.Sloot, P. (2003). International conference of computational science.

No comments:

Post a Comment