In: Computer Science
Due to less business at many car repair workshops during lockdown, some of the workshops had to lay off a number of employees. People were mostly working from home and they were not using their cars. John was among the people that were retrenched. The industry consultants reckon it could take them a while before the business can peak.
John decided to set his own backyard business at home where he could serve the people in his neighbourhood. He then realised that for him to be able to make a viable business, he has to order genuine parts form recognised dealers for the types of cars that he will be working on. The suppliers have computerised their systems and some of the suppliers have closed warehouses where he cannot go and select the motor parts.
John must make his orders online from the car parts suppliers. Besides repairing cars, John also sells parts to other mechanics in the area who are not able to buy from the car parts dealers. John’s clients order the car parts and online. John’s company uses a delivery service to get the car parts to the respective clients who would have ordered online. John uses social media and word of mouth to advertise the businesses.
Suppliers of different car parts deliver the products to his home. He receives different types of delivery notes. Some suppliers send hard copies and some send the delivery notes to be signed online when the order arrives. There are clients from the neighbourhood that can order online and make a payment when they go to John’s house to collect their orders. Source: Makhurane, N. (2020)
Question 8
How does John protect the business systems from software threats?
Some common measures that can be taken by John to protect his business system from software threats
There are many ways in which cyber thieves can enter in our business and attack so John should take care of following points
John should not used any infected website or application which contains software that can capture keystrokes or password or any type of data
Best way to protect from these type of Malware attack is to use antivirus software
John should not respond to any e email that looks like official and tells to enter password for handling to the infected website since it is most common way cyber thieves use
John should work on software that should have encryption so that it is very hard for the the cyber thieves to decode the messages and the order given to the John and the order given by John to the dealers
A very essential thing for information security is to have backup of the entire data of the business so that if there's any problem in the data the data lost can be restored.
To stop the business from the cyber attack all business organisation should use firewall which can be both hardware and software. Hardware firewall with change connected to the network and it filters the the data based on some rules. This software firewall intercepts packet when the packet arrived at the computer. Firewall protects the company server by stopping all the packets that do not meet the set of the criteria.
You can comment if you have any doubt.
Upvote if you got your answer.
Thanks