In: Operations Management
Willowbrook School
Chapter 12
Willowbrook School is a small private school that has retained your services as a systems analyst
to assist in the development of a new information system for the school’s administrative needs.
Background
After implementation of a new system, it moves into the support phase of the SDLC. The system
at Willowbrook has been up and running for five months now, and things are moving reasonably
smoothly. Willowbrook is pleased with the system’s ability to
handle registration and some
of the school’s other administrative and financial tasks.
You have been asked to contract
for ongoing support services on an as needed basis. The school would like to arrange for support
services in such a way that your time is used as efficiently as possible because their budget for
support is small.
Tasks
4.
You decide to prepare a security checklist for Willowbrook. Prepare a list of security
issues that the firm should evaluate and monitor. Be sure to organize the items into
categories that match the six security levels
List of that firm should evaluate and monitor are:
1)The internal team must be analyzed and only those person who has been approved by the higher authorities must use this system.No outsider is even allowed to enter this area not even the highest authority who is not in the team.
2)Intruders and hackers send too many false requests, hence be very careful regarding network interface, data encryption network traffic control. if it's not being evaluated and monitored then the situation will come that the internal team cannot log in as well.
3)Malware download is another problem hence it must be always monitored that nothing is being downloaded from the external network or untrusted website.
4)safeguarding password is the most crucial one. Password cracking means that the intruder will use certain software to know or crack the password hence password change at regular intervals should be done along with recognition of management skills and boosting social engineering.
5)Software updation and data input must be analyzed and monitored by the authority,
6)Any kind of Phishing or spamming must be checked that too at regular intervals.
These are the security checks that everyone should keep in mind to use the system in a secure manner and without any worry.These are the network checks that meet the requirement of security checks i,e, Physical security,Network security,Application security,File security,user security,procedural security.