Get help now

Writing assignment 4 procedural message

  • Pages 2
  • Words 438
  • Views 331
  • dovnload



  • Pages 2
  • Words 438
  • Views 331
  • Academic anxiety?

    Get original paper in 3 hours and nail the task

    Get your paper price

    124 experts online

    Outside its headquarters, there are two large production facilities? one in Nebraska and one in Oklahoma. Furthermore, Yielder employs sales force personnel in every state in the U. S. To serve its customers locally. The company has three servers located at its headquarters?Active Directory Server, Linux application server, and an Oracle database server.

    The application server hosts Wielder’s primary software application, which is proprietary program managing inventory, sales, supply-chain, and customer information. The database server manages all data stored locally with direct attached storage. All three major sites use Ethernet cabled local area networks (Lana) to connect the users’ Windows Vista workstations via industry standard, managed switches. The remote production facilities connect to headquarters via routers T-1 (1. Mbps telecoms circuit) LANA connections provided by an external Internet service providers (ISP) and share an Internet connection through a firewall at headquarters. Individual sales personnel throughout the country connect to Wielder’s network via virtual private network (VPN) software through their individual Internet connections, typically in a home office. Task: would have to say the most likely pairs of threat/vulnerability are location, equipment failure, social engineering, Denial of Service (DOS), and Mall ware.

    These threats seem to be the most problematic for this company. The first one is location; the servers are all housed in the company headquarters where if a natural or manmade disaster would cripple the company’s infrastructure. They need to distribute their servers to different locations. Another pair is equipment failure; each server has its own specific function that it handles and nothing else. It would help mitigate some of the risk that would happen if each server handled their own problems.

    Social engineering is a problem because it is dependent on the user which another person can hack the person for information that could get access to the organizations system. DOS is a problem because the public systems are not protected by firewalls and anti-virus program. This makes service availability a loss. The final problem is mallard which is caused by the lack of anti-virus or out of date virus definitions. The impact of this is usually the loss of server or information depending on what the virus was originally intended to o.

    There are six risk management steps you can use to protect your company: 1. Determining the objectives of the organization, 2. Identifying exposures to loss 3. Measuring those same exposures, 4. Selecting alternatives, 5. Implementing a solution, 6. Monitoring the results. Would suggest using all six steps to insure that my company is protected. The primary objective of an organization growth will determine its strategy for managing various risks. Identification and measurement of risks are relatively straightforward concepts.

    This essay was written by a fellow student. You may use it as a guide or sample for writing your own paper, but remember to cite it correctly. Don’t submit it as your own as it will be considered plagiarism.

    Need a custom essay sample written specially to meet your requirements?

    Choose skilled expert on your subject and get original paper with free plagiarism report

    Order custom paper Without paying upfront

    Writing assignment 4 procedural message. (2018, Jul 06). Retrieved from

    Hi, my name is Amy 👋

    In case you can't find a relevant example, our professional writers are ready to help you write a unique paper. Just talk to our smart assistant Amy and she'll connect you with the best match.

    Get help with your paper
    We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy