previous task 4


![Text Box: [Draw your reader in with an engaging abstract. It is typically a short summary of the document. When you’re ready to add your content, just click here and start typing.]](file:///C:/Users/19MasianaH/AppData/Local/Packages/oice_16_974fa576_32c1d314_3eb9/AC/Temp/msohtmlclip1/01/clip_image003.png)



|
Name: |
|
|
Department: |
|
|
Email: |
|
Post-project review
After a thorough interview with line manager and a review
of control document A in task 3 I have identified a few issues that swiifttech
solution suffers from they are:
Identified issues
o
Unauthorised login attempts
o
Unrestricted remote access to company servers
o
VPN service is significantly outdated or
misconfigured
o
Weak encryption enforcement standards
o
Lack of role based access control
o
Poor staff training
o
Vulnerable to Phishing attacks
Survey
1. How easy is it to use these IT solutions that
have been implemented?
o
Very
o
Slightly
o
Somewhat
o
Not
o
Very not
2. How
likely are you to recommend these it solutions to others?
|
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
|
|
|
|
|
|
|
|
|
|
|
3.How intuitive is the user interface?
o
Very
o
Intuitive
o
Somewhat
o
Not
o
Very not
4.Did you encounter any difficulties when using this IT
solutions?
YES/NO
5. What could be improved to make these It solutions easier
to use for SWIFTTECH solutions?
______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
6. Which features of
this IT solution did you find most valuable?
______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
7. Are there any
features that you feel are missing or can be improved?
______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
8. Which one the features do you like the most?
______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
9. How likely are you to recommend these IT solutions to
others?
|
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
|
|
|
|
|
|
|
|
|
|
|
10. How has the new
IT solutions impacted your workflow?
______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
11. how would you rate the performance of the new
system?
|
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
|
|
|
|
|
|
|
|
|
|
|
12.What are the biggest benefits of the new IT solutions?
_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
13. How likely are you to continue using these IT
solutions?
|
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
|
|
|
|
|
|
|
|
|
|
|
14. Did the new solutions meet your expectations in terms
of easy to use?
______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
15. Is there anything that doesn’t work the way it should
due to the new solutions that have been implemented?
___________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Identified solutions for the issues
Role
based access control
Role-based access control (RBAC),
also known as role-based security, is a mechanism that restricts system access
It involves setting permissions and privileges to enable access to authorized
users this is what I recommend that this organisation uses so their data
remains secure . Then that will eman only people who should have access to
resources will get it in swiftFin solutions this ensures data is safe
It also streamlines the onboarding and offboarding of
employees and reduces certification fatigue. As a result of this this
organisation is compliant with laws and regulation like gdpr and they are fully
complaint and don’t risk suffering from legal financial and reputational
repercussions. This will limit things like only admins will be able to install
certain things access certain information this enhances their security.
Encryption
At its most
basic level, encryption is the process of protecting information or data by
using mathematical models to scramble it in such a way that only the parties
who have the key to unscramble it can access it. Encryption ensures no one can
read communications or data except the intended recipient or data owner. This
prevents attackers from intercepting and accessing sensitive data. This is what
Swift fin solutions should use mandatory in every place from storing files to
sending data this ensures data is safe and also they are complaint with laws
and regulations and don’t suffer from legal repercussion or financial. So I recommend
that SwiftFin use asymmetric encryption for store files and also they use vpns
like nord mandatory.
Shared
login
Logins should
be different for everyone and the passwords should also be unique for everyone
also the passwords should have a range of different letters and characteristics making sure that they aren’t
easy to guess and this also ensure upmost security from attacks such as dictionary or brute force attacks that are
built to crack passwords.
Network
topology
With all the new hardware suggested to Swiftfin solution, the following topology would be a great example on
how the company could rearrange their network. This will also re-assure the
company that their network runs smoothly as they have been using their topology
for a long time which means that the topology is robust and efficient for the
organization. This network topology that I have bellow is the best
(efficient) and secure system they can have with the devices that Swiftfin
solution has. Here idenyed solutions to improve the efficiency and the
performance of SwiftTech solutions hardware.
VPN
service
virtual private
network, protects its users by encrypting their data and masking their IP
addresses. This hides their browsing activity, identity, and location, allowing
for greater privacy and autonomy. Anyone seeking a safer, freer, and more
secure online experience could benefit from a VPN especially a organisation
that facilities payments so it is important that their data is encrypted and as
a result data will be safe of this organisation and SwiftFin will be compliant
with laws such as GDPR and this is quite beneficial for the origination as
there is increase security and there wont be any connectivity issues because
Nord Vpn is one of the best Vpns out there. The vpn management system needs updating
currently it uses IPsec currently by default all traffic connected uses IPSec
all connections must be authenticated however when Look at the current active
connection there seems to be a few issues such as the IT laptop does not have
encryption however the HRlaptop does that is good so the confidential
information that hr holds doesn’t go into the hands of cybercriminals but
however it is important that all devices are protected and they have encryption
because currently only hr does.
STAFF
TRAINING
Staff training
is also a key issue that need to sorted out because the staff at of Swiftfin
solution only get trained once and then that it that the only mandatory
training they receive. That is not enough and the staff should have to do multiple
staff training programs monthly so they
are updated to the most recent modern ways such as phishing attacks that cyber criminals attempt to steal
information weather that be through social engineering attack or spear phishing
staff should be able to identify it because if they don’t like the currently
aren’t its easy for them to expose the confidential information of the
organisation.
Evaluation of my own performance
Overall, I think that my performance in time management was
the best and most helpful factor for my work because I had a lot of work to do
in a small amount of time and I had to make sure it was up to quality and met
all of the requirements. This is very important and was key in helping me to
complete all tasks and make sure nothing was left out. However, on the other
hand I think that on certain things I didn’t have too much information while on
other I may of overdone certain things and wrote more than I should have and
also may have made me repeat certain things which made me look unprofessional. Such as I could have gone into more detail
about the hardware and instead I put to much information on VPNs for example.
Here are some things I thought I did more
Time management
Writing in detail
Structuring and layout
of my work
Bellow are some issues I can improve on:
I need to expand more of issues I have not written to much
about I should compare with other things such as other tasks and issues I have
done and see if I have written enough and to do this I should look back after I
have completed my work. Also I think I should use root core analysis to my
advantage in order to properly write about methods I can use to test for
hardware faults such as using 5 whys methodology to properly get to the cause of the issues
instead of speculating about them. This is a more professional way that is used
by large organisations to mitigate cybersecurity threats and I can also
implement this to ensure accuracy this is something I should do next time.
Comments
Post a Comment