In: Accounting
For each of the following parts of an IT system of a company, write a one‐sentence description of how unauthorized users could use this as an entry point:
a. A local area network (LAN)
b. A wireless network
c. A telecommuting worker
d. A company website to sell products
a). LAN - Unauthorised Users can have access to LAN by exploiting the password vulnerabilities like poor password management, easy guess password
b). A Wireless Network - Unauthorised Users can have access to Wireless networks by way of bypassing all security & defences within an organisation.This is possible because packets of data in wireless networks are sent through the air, they can be intercepted and modified quite easily by malicious users.
c). A Telecommuting Worker - They can have access by way of the Interent used by the telecommuting worker. By use of Phishing links & Malicious site links & pop-ups
d). A Company Website - Unauthorised Users can have access to the website by way of acting like a general customer buying the company's product & once they have entered the website they will start cracking the core of the company's website by connecting to the company's network.