GAIL INDUSTRIES EXECUTIVE LEADERSHIP
6
GAIL INDUSTRIES EXECUTIVE LEADERSHIP
Gail Industries Executive Leadership
Katherine Askew
BSA/520
August 3, 2021
Ongart (peng) Ratchaworapong
Computers and other innovative devices have become vital for different business processes. An essential use of IT assets in business is communication and transactions with the customers. These digital devices and other IT assets, such as the internet, have increasingly been adopted by small, medium, and large businesses worldwide. However, they are increasing one of the key targets by cybercriminals (Parn & Edwards, 2019). Thereof, despite the numerous benefits of innovations in business IT, it also presents various risks and threats to both the customers and the company. When organizations such as Gail Industries and others experience a security breach, they may incur significant losses through legal issues and destruction of public image they already enjoy. This report focuses more on the risks associated with online transactions for Gail Industries, as requested by Smallville clients. It will also focus on threats related to OS, network, system software, and risks associated with adopting a distributed environment model.
Risk and Threats of Transacting over the Internet
As part of its functions, Gail Industries oversees millions of digital transactions daily on numerous back-office processing agreements. The city of Smallville has more than 2.5 million individuals. The Smallville Collections Processing Entity (SCOPE) is one of the essential customers for Gail Industries. Having in mind the large number of people served by SCOPE, it would be crucial for Gail Industries to expose all the risks and threats to the customers. The information will enable all stakeholders to implement measures aimed at protecting the consumers from the loss that may result from online fraud or other threats and risk them may be exposed (Parn & Edwards, 2019). The online payment website used by SCOPE to process transactions presents various risks to the city residents that are served by the entity. Some of these threats may be accidental, while others may be purposeful in defrauding or committing online crime. Other risks may be due to human error. The most common threats the SCOPE customers may face are electronic payment systems, data misuse, e-cash, or card fraud.
With the rapid development of computers, the internet, and mobile network, online transactions have become part of our daily lives. In this case, the Smallville city residents can make their payments through checks, credit, or debit cards. Example of cash is for the parking tickets within the city, licensing fee, tax payments, and court costs for the municipality to the SCOPE, increasing payment efficiency for the customer and the company by reducing the paperwork and labor cost. However, customers are likely to be faced with the risk of fraud. There are different authentications, such as security questions or passwords used by these devices aimed at determining the identity of such a person (Parn & Edwards, 2019). When the system matches the security authentication, it does not care who is on the other end but authorize their payment. If an individual has access to passwords or security answers, they will have access to the money in the system even if they are not the real owners. The customers also face the threat of identity theft if unauthorized people have access to the payment data held by Smallville city.
Threats Related To OS, Networks, and System Software
Most of the payment processes at Smallville city have been automatized and are available on the internet. The residents of Smallville are exposed to numerous threats related to OS, network, and system software. Trojan horse is one of the most common risks for the residents. It traps the user login credential such as passwords or security questions. This information is sent to the malicious or unauthorized users who can later log in and access the system. The trap door is the other common threats that expose Smallville’s OS. (Novokhrestov, Konev & Shelupanov, 2019). This situation refers to when a program designed to work as they are, but they have a security hole in its codes used in performing illegal transactions. The other OS associated threat is the virus, which compromises the entire system by unauthorized users.
When conducting transactions over the internet, Smallville residents face system threats. The worm is one of the most common risks and refers to a process that chokes the system software by using the system resources to extreme levels. Worms will affect the system efficiencies or even shut down the entire network. Port scanning is also another common threat associated with system software that exposes Smallville residents, a mechanism used by hackers or unauthorized users to detect system vulnerabilities, makes it easier for the cybercriminal to attack the system (Novokhrestov, Konev & Shelupanov, 2019). Spyware is the other system threats that the Smallville residents who conduct transactions over the internet will face. Spyware is software designed to track internet users; browsing habits. Spyware installed in the victims’ computers or other devices without their knowledge. They often contain vital loggers that record, passwords, email addresses, credit card numbers, and additional personal information.
Risk of Different Database Deployment Models in a Distributed Environment
Databases are often desirable targets for cyber-attacks due to the sensitivity of the information they contain. Financial and personal data provided in the SCOPE defenses increases the risk of attack. Their attackers may utilize the personal or financial information of Smallville residents to commit cybercrime, such as fraud, through the stolen identity. The cybercriminals will most likely make a profit by breaching the information security within the datacenters. Poor encryption techniques are other common threats associated with deploying in a distributed environment (Pevnev & Kapchynskyi, 2018). There are network interfaces within the databases that hackers quickly tracked when software security is weak or compromised. However, organizations can avoid this by using SSL or TSL encrypted communication platform.
Weak or complex database infrastructure is another common threat that Smallville residents use to conduct their online transactions. Hackers do not often take the entire control of the database at one go. They often opt to determine a particular weakness within the database infrastructure and use it for their advantage. The hackers would then launch a string of attacks to reach the backend. The standard security software used by SCOPE may not adequately protect the system from these manipulations. Even if the security team at SCOPE pays attention to specific security flaws, it is imperative to ensure the entire database is not too complicated (Pevnev & Kapchynskyi, 2018). When the system becomes too expensive, the security team will always forget or neglect to check and fix its weaknesses, enhances the capabilities of hackers to manipulate the system much comfortably. Therefore, all the departments at SCOPE need to ensure they maintain the same level of control and often segregate the system to ensure the focus is decentralized while reducing the possible risk associated with databases in distributed environments.
References
Novokhrestov, A., Konev, A., & Shelupanov, A. (2019). Model of Threats to Computer Network Software. Symmetry, 11(12), 1506.
Parn, E. A., & Edwards, D. (2019). Cyber threats are confronting the digital built environment: engineering, Construction, and Architectural Management.
Pevnev, V., & Kapchynskyi, S. (2018). Database security: threats and preventive measures.
Our Unique Features
Custom Papers Means Custom Papers
This is what custom writing means to us: Your essay starts from scratch. Plagiarism is unacceptable. We demand the originality of our academic essay writers and they only deliver authentic and original papers. 100% guaranteed! If your final version is not as expected, we will revise it immediately.
Qualified and Experienced Essay Writers
Our team consists of carefully selected writers with in-depth expertise. Each writer in our team is selected based on their writing skills and experience. Each team member is able to provide plagiarism-free, authentic and high-quality content within a short turnaround time.
Free Unlimited Revisions
If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.
Prompt Delivery and 100% Assuarance
We understand you. Spending your hard earned money on a writing service is a big deal. It is a big investment and it is difficult to make the decision. That is why we support our claims with guarantees. We want you to be reassured as soon as you place your order. Here are our guarantees: Your deadlines are important to us. When ordering, please note that delivery will take place no later than the expiry date.
100% Originality & Confidentiality
Every paper we write for every order is 100% original. To support this, we would be happy to provide you with a plagiarism analysis report on request.We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.
24/7 Customer Support
We help students, business professionals and job seekers around the world in multiple time zones. We also understand that students often keep crazy schedules. No problem. We are there for you around the clock. If you need help at any time, please contact us. An agent is always available for you.
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.
Our Services
Our services are second to none. Every time you place an order, you get a personal and original paper of the highest quality.
Essays
While a college paper is the most common order we receive, we want you to understand that we have college writers for virtually everything, including: High school and college essays Papers, book reviews, case studies, lab reports, tests All graduate level projects, including theses and dissertations Admissions and scholarship essays Resumes and CV’s Web content, copywriting, blogs, articles Business writing – reports, marketing material, white papers Research and data collection/analysis of any type.
Admissions
Any Kind of Essay Writing!
Whether you are a high school student struggling with writing five-paragraph essays, an undergraduate management student stressing over a research paper, or a graduate student in the middle of a thesis or dissertation, homeworkmarketpro.com has a writer for you. We can also provide admissions or scholarship essays, a resume or CV, as well as web content or articles. Writing an essay for college admission takes a certain kind of writer. They have to be knowledgeable about your subject and be able to grasp the purpose of the essay.
Reviews
Quality Check and Editing Support
Every paper is subject to a strict editorial and revision process. This is to ensure that your document is complete and accurate and that all of your instructions have been followed carefully including creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.
Reviews
Prices and Discounts
We are happy to say that we offer some of the most competitive prices in this industry. Since many of our customers are students, job seekers and small entrepreneurs, we know that money is a problem. Therefore, you will find better prices with us compared to writing services of this calibre.