Bead Bar Information Systems Technology1.What are the companyÃÂs major information security threats?Poorly written software or improperly configured systemsÃÂThe systems administrator made a mistake when setting it up leading to security problems.
ÃÂImproper configuration of these servers may leave severs open; meaning people outside the organization can use the server.
ÃÂImproper configuration of the e-mail server allows anyone to send e-mail, especially spam, through it.
ÃÂImproperly configured systems leave organizations vulnerable.
Computer viruses and wormsÃÂA computer virus is a self replicating program that loads onto a computer without the userÃÂs knowledge.
ÃÂA worm is a virus that spreads itself over a computer network, most often the Internet.
ÃÂA single worm, called Love Bug traveled by e-mail can enter your computer and delete important files.
External BreachesÃÂUnauthorized access of a computer from somebody outside an organization.
ÃÂThe mass media usually uses these terms to people who perpetrate external breaches: Hackers, Crackers, and Script kiddies.
Internal breachesÃÂSecurity violations which is knowingly performed by a person, or which is deliberately omitted.
ÃÂBypasses or contravenes security policies, practices, or procedures established by the company.
2.Develop a security awareness training plan for employees and franchisees.
The Chief Information Officer (CIO) is the person that will develop a training plan for the companyÃÂs employees.
CIO needs to involve everyone in the company. This will help identify the companyÃÂs security threats and develops a security preparation plan to contest them.
Bead Bar was lacking security policies and procedures; therefore, the training plan must include:ÃÂAll departments to worked together to develop a security plan.
ÃÂIncorporate technical, procedural, and educational approaches.
ÃÂThe awareness of good technical solutions to all departments.
ÃÂOnly the people who should have access to classify information are the only ones allow access to the information.
ÃÂImplementing a method for verifying that the franchise person...