In: Operations Management
what are some of the risks, threats, and vulnerabilities commonly found in the workstation domain?
A work station domain is a special computer used by one person at a time for specific technical purposes.The work station domain are affected by the risks threats and vulnerabilities. Some of these threats are described here.
Illegal access to Workstation The workstation domain has a risk of access by unauthorized users.The authorized user of the work station domain should ensure that the workstation should be password protected .The user should enable auto screen lockout for inactive times.
Threats from Viruses The work station domain should be protected from viruses which infect the workstation.These viruses may damage the system. A proper antivirus software should be installed in the system to to detect the threats from viruses.
Usage of CDs,DVDs and USB The user of the workstation may insert USB DVDs and CDs to the workstation for various purposes.These devices may have viruses which will be passed on to the workstation. An automatic antivirus scan should be installed while the DVDs,CDs and pen/thumb drive are inserted into the workstation.
System Software Vulnerabilities The workstation has to be checked for security updates and sytem software patches.Workstation vulnerability test has to be done randomly and proper workstation system software vulnerably policy has to be implemented.
Usage of Internet The users of the workstation uses the internet access for various purposes.The users may download videos, photos from the internet. These downloads may be infected by viruses.Their should be antivirus scanning when the user logon and exit the internet.There should be a auto scanning mechanism for the downloaded files from the internet.
Lack of Security awareness training to employees or users of workstation Every user of the workstation domain should be aware about the threats and vulnerabilities of the workstation.The users should undergo security awareness training to be well aware and to become cautious about the risk involved in using a work station.The training will help them to become well equipped and help them for safeguarding the workstation domain from various threats and vulnerabilities.
All these threats can be controlled by implementing strict access control guidelines and standard procedures.