Common Information Security Threats

Submitted by: Submitted by

Views: 10

Words: 990

Pages: 4

Category: Science and Technology

Date Submitted: 07/07/2016 07:11 PM

Report This Essay

Common Information Security Threats involving Ethical and Legal

The Lafleur Trading Company has supplied the world with the finest foods and wines since 1975. Their buyers only work with reputable producers and exporters for products of the highest quality. Lefleur uses the latest technologies for the fastest shipping and low overhead cost that translates into a competitive corporation. The company’s mission is to give their customers the highest quality foods at a reasonable price.

Lefleur has an administration-home office facility, Central IT, a warehouse in Canada and remote offices in Los Angeles, Boston, Miami, and Hong Kong.

I intend to address the company about the security issues that it may face within its organization and describe the vulnerabilities and threats to the organization. The potential risks to the information and the related vulnerabilities when using web components will be explained as well. I will also be discussing how Lafleur can safeguard itself from legal issues and some of the types of social data that could cause problems for the organization. Legal, ethical, and regulatory requirements for protecting the data will be explained also.

The company has a 1000baseT-cat6 backbone structure in its Home Office and uses a bus architecture to support its executive offices, in store sales, general administration computers, general administration printers and VOIP. A denial of service attack would be a great annoyance to the administrative network. “They don’t directly steal your information, or cause any overt harm—they just flood a site or service with so much traffic that it becomes overwhelmed and prevents legitimate users from connecting to it “(Bradley). A SYN flooding attack prevents service to a system temporarily so that the attacker can take advantage of the trusted relationship between that system and another. It will use the TCP three-way handshake. SYN flooding targets a protocol.” Though much of the...