previous task 4

Text Box:      Text Box: [Draw your reader in with an engaging abstract. It is typically a short summary of the document. When you’re ready to add your content, just click here and start typing.]Text Box: Task 4


 

Name:

 

Department:

 

Email:

 

 

 

Post-project review

After a thorough interview with line manager and a review of control document A in task 3 I have identified a few issues that swiifttech solution suffers from they are:

Identified issues

o   Unauthorised login attempts

o   Unrestricted remote access to company servers

o   VPN service is significantly outdated or misconfigured

o   Weak encryption enforcement standards

o   Lack of role based access control

o   Poor staff training

o   Vulnerable to Phishing attacks

 

Survey

 

1.     How easy is it to use these IT solutions that have been implemented?

o   Very

o   Slightly

o   Somewhat

o   Not

o   Very not

 

 

 

 

2.    How likely are you to recommend these it solutions to others?

1

2

3

4

5

6

7

8

9

10

 

 

 

 

 

 

 

 

 

 

 

 

3.How intuitive is the user interface?

o   Very

o   Intuitive

o   Somewhat

o   Not

o   Very not

 

 

 

 

 

4.Did you encounter any difficulties when using this IT solutions?

YES/NO

 

 

 

 

5. What could be improved to make these It solutions easier to use for SWIFTTECH solutions?

 

______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

 

 

 

6.  Which features of this IT solution did you find most valuable?

 

______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

 

 

 

 

 

 

7.  Are there any features that you feel are missing or can be improved?

______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

 

 

 

 

 

 

8. Which one the features do you like the most?

______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

 

 

 

 

 

 

 

 

 

9. How likely are you to recommend these IT solutions to others?

1

2

3

4

5

6

7

8

9

10

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

10.  How has the new IT solutions impacted your workflow?

 

______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

 

 

 

 

 

 

 

11.   how would you rate the performance of the new system?

 

1

2

3

4

5

6

7

8

9

10

 

 

 

 

 

 

 

 

 

 

 

 

12.What are the biggest benefits of the new IT solutions?

_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

 

 

 

 

 

 

 

 

 

 

13. How likely are you to continue using these IT solutions?

 

 

1

2

3

4

5

6

7

8

9

10

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

14. Did the new solutions meet your expectations in terms of easy to use?

 

______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

 

 

 

 

 

15. Is there anything that doesn’t work the way it should due to the new solutions that have been implemented?

 

___________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

 

 

 

 

Identified solutions for the issues

 

 

 

 

 

 

Role based access control



Role-based access control (RBAC), also known as role-based security, is a mechanism that restricts system access It involves setting permissions and privileges to enable access to authorized users this is what I recommend that this organisation uses so their data remains secure . Then that will eman only people who should have access to resources will get it in swiftFin solutions this ensures data is safe

It also streamlines the onboarding and offboarding of employees and reduces certification fatigue. As a result of this this organisation is compliant with laws and regulation like gdpr and they are fully complaint and don’t risk suffering from legal financial and reputational repercussions. This will limit things like only admins will be able to install certain things access certain information this enhances their security.

Encryption

At its most basic level, encryption is the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it. Encryption ensures no one can read communications or data except the intended recipient or data owner. This prevents attackers from intercepting and accessing sensitive data. This is what Swift fin solutions should use mandatory in every place from storing files to sending data this ensures data is safe and also they are complaint with laws and regulations and don’t suffer from legal repercussion or financial. So I recommend that SwiftFin use asymmetric encryption for store files and also they use vpns like nord mandatory.

 

Shared login

Logins should be different for everyone and the passwords should also be unique for everyone also the passwords should have a range of different letters and  characteristics making sure that they aren’t easy to guess and this also ensure upmost security from attacks such as  dictionary or brute force attacks that are built to crack passwords.

 

 

Network topology

 

With all the new hardware suggested to Swiftfin solution, the following topology would be a great example on how the company could rearrange their network. This will also re-assure the company that their network runs smoothly as they have been using their topology for a long time which means that the topology is robust and efficient for the organization. This network topology that I have bellow is the best (efficient) and secure system they can have with the devices that Swiftfin solution has. Here idenyed solutions to improve the efficiency and the performance of SwiftTech solutions hardware.

 

 

VPN service

virtual private network, protects its users by encrypting their data and masking their IP addresses. This hides their browsing activity, identity, and location, allowing for greater privacy and autonomy. Anyone seeking a safer, freer, and more secure online experience could benefit from a VPN especially a organisation that facilities payments so it is important that their data is encrypted and as a result data will be safe of this organisation and SwiftFin will be compliant with laws such as GDPR and this is quite beneficial for the origination as there is increase security and there wont be any connectivity issues because Nord Vpn is one of the best Vpns out there.  The vpn management system needs updating currently it uses IPsec currently by default all traffic connected uses IPSec all connections must be authenticated however when Look at the current active connection there seems to be a few issues such as the IT laptop does not have encryption however the HRlaptop does that is good so the confidential information that hr holds doesn’t go into the hands of cybercriminals but however it is important that all devices are protected and they have encryption because currently only hr does.

 

 

STAFF TRAINING

Staff training is also a key issue that need to sorted out because the staff at of Swiftfin solution only get trained once and then that it that the only mandatory training they receive. That is not enough and the staff should have to do multiple staff training programs monthly  so they are updated to the most recent modern ways such as phishing attacks  that cyber criminals attempt to steal information weather that be through social engineering attack or spear phishing staff should be able to identify it because if they don’t like the currently aren’t its easy for them to expose the confidential information of the organisation.

 

 

Evaluation of my own performance

 

Overall, I think that my performance in time management was the best and most helpful factor for my work because I had a lot of work to do in a small amount of time and I had to make sure it was up to quality and met all of the requirements. This is very important and was key in helping me to complete all tasks and make sure nothing was left out. However, on the other hand I think that on certain things I didn’t have too much information while on other I may of overdone certain things and wrote more than I should have and also may have made me repeat certain things which made me look unprofessional.  Such as I could have gone into more detail about the hardware and instead I put to much information on VPNs for example.

Here are some things I thought I did more

Time management

Writing in detail

Structuring and layout  of my work

Bellow are some issues I can improve on:

I need to expand more of issues I have not written to much about I should compare with other things such as other tasks and issues I have done  and see if I have written enough   and to do this I should look back after I have completed my work. Also I think I should use root core analysis to my advantage in order to properly write about methods I can use to test for hardware faults such as using 5 whys methodology  to properly get to the cause of the issues instead of speculating about them. This is a more professional way that is used by large organisations to mitigate cybersecurity threats and I can also implement this to ensure accuracy this is something I should do next time.


Comments

Popular posts from this blog

TASK 1 MINE FULL

Eveything TASK format

Full format what i done at home questions