Friday, May 10, 2019
Case Study Essay Example | Topics and Well Written Essays - 1250 words - 14
Case Study - Essay Exampleed start-up company, the Chief Information Security Officer (CISO) should be well equipped to handle a incalculable of challenges and surety threats posed by using online transactions. Companies like American Express, Visa, Discover, JCB, and MasterCard among opposites have experienced information security threats and then the new company should employ mechanisms that should protect information from both internal and external threats.The medium-sized quote card company inescapably to employ several mechanisms to ensure its customers and their private information remains arctic and confidential. There have been cases of quote card frauds that have led to provision of guidelines to help in securing credit cards for instance, the Payment Card Industry Data Security Standards (PCI DSS) that helps in securing credit cards data.Cyber-criminals perfunctory users, disgruntled former and current employees present major challenges in handling network security peculiarly the experts that target the system with aim of disrupting the normal company operations. There are major advancements that the company needs to perform to ensure cyber threats are kept at bay. Berry (2013) pinpoints several fundamentals that the company should condense on while offering its credit card services to its customers. For the company to be secure, it has to carry give away the following tasksThere are vulnerabilities that are exploited by cyber criminals mostly in the operating systems, weave browsers, browser plug-ins and software applications among other avenues. The company gadgets and computers that are frequently used should be kept updated thus reducing chances of them being exploited by cyber-criminals. Programs such as Adobe Acrobat, Flash, Oracle, Java, Microsoft Internet Explorer and other MS programs should be kept updated as they are mostly used during credit card usage. development strong passwords for the cards enhances protection of the cust omers information. Cyber attackers use the loopholes of weak
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.