Small and micro-business enterprises have greater access to a variety of information technology tools that improve productivity such as netbooks, smartphones and cloud computing-based services. However,...

      

Small and micro-business enterprises have greater access to a variety of information technology
tools that improve productivity such as netbooks, smartphones and cloud computing-based services. However, without adequate end point security practices in place, many enterprises
are exposed to both external and internal threats that could cripple their operations.
Identify the end point security threats to small and micro-business enterprises,

  

Answers


Kavungya
- Disclosure: Where messages and data traversing internet can be seen by other machines
including e-mail files, passwords and in some cases key-strokes as they are being entered
in real time.

- Unauthorized access: since many internet software packages can render system subject
to attack. Lack of proper configuration can result to unauthorized access incidents. The
perimeter can be protected with firewalls

- Theft or alteration of corporate information: where information can be intercepted and
contents changed, this can have disastrous effect.

- Viruses and worms: this can be from from e-mail attachments. An email anti-virus
gateway to filter incoming email messages can be used for protection.

- Disruption of network devices and services- Set up an authentication server on the
network and equip remote users with authentication tokens.
Kavungya answered the question on May 14, 2019 at 07:46


Next: a) To be considered an executive information system (EIS), a software product should address certain needs of the executive. b) Briefly describe four structural elements of a...
Previous: Explain four security concerns that personal computer users face in an organization.

View More ATD Information Communication Technology Questions and Answers | Return to Questions Index


Exams With Marking Schemes

Related Questions