Running Head: CAPSTONE PROJECT 1
CAPSTONE PROJECT 7
Recommendations Concerning Security
Name
Course
Professor
10/7/2017
Recommendations Concerning Security
Introduction
Verbania, Inc., first needs to identify its users and create a community that can be easily identified where its needs will be met and this comes with knowing and understanding their preferences and dislikes (Rampton, 2017). There are psychological factors to be understood in this community as they will be consuming information being provided for them hence the need to define the features and functions based on the community’s quality. Choosing the right technology is key in determining the effectiveness and efficiency of the network that will be used and professionals have to be involved in the evaluation process (Rampton, 2017). Having a structure in place is also important as it requires that customer service, security, and scalability be incorporated to the website or application so that users can be kept longer on the site's activities. Quality activity stream is another aspect of the system that must be developed and it be of great quality so that it can be attractive to the target community. Status update features are critical for a social media network as it increases the chances of users engaging with the site citing that most of them want to express their feelings freely and it makes people to be immediately hooked to them as they are addictive. With these in mind, Verbania, Inc., has to come up with a security plan, security policy and security solution to the social networking Web site and application for quality use by the target community (Rampton, 2017).
Security Plan
Disaster Recovery
Verbania, Inc., should not have any data loss, and thus the importance of having in place a fundamental procedure to define step-by-step measures that should be used so as to make the system or network that was disrupted to recover while the end goal is to initiate normal operations. The recovery plan will be that the IT systems as well as networks be recovered from the disaster by having a set of priorities towards the time factor whereby the normal operations should be reinstated (Kirvan, 2009).
In the risk management plan, there could be a situation that might be caused either within the organization, hackers, brought about by an employee’s device or a user and it should be assessed (Kirvan, 2009). This is because it could affect the most critical infrastructure responsible for the day-to-day operations of the system in place. In terms of viability, competitiveness, and financial solidness, the organization has to make sure that the IT system is fully operational (Kirvan, 2009). It is essential to develop the necessary contingency plan policy where it is a statement in.
Hybridoma Technology ( Production , Purification , and Application )
Running Head CAPSTONE PROJECT .docx
1. Running Head: CAPSTONE PROJECT
1
CAPSTONE PROJECT
7
Recommendations Concerning Security
Name
Course
Professor
10/7/2017
Recommendations Concerning Security
Introduction
Verbania, Inc., first needs to identify its users and create a
community that can be easily identified where its needs will be
met and this comes with knowing and understanding their
preferences and dislikes (Rampton, 2017). There are
psychological factors to be understood in this community as
they will be consuming information being provided for them
hence the need to define the features and functions based on the
community’s quality. Choosing the right technology is key in
determining the effectiveness and efficiency of the network that
will be used and professionals have to be involved in the
evaluation process (Rampton, 2017). Having a structure in place
is also important as it requires that customer service, security,
and scalability be incorporated to the website or application so
that users can be kept longer on the site's activities. Quality
activity stream is another aspect of the system that must be
developed and it be of great quality so that it can be attractive
2. to the target community. Status update features are critical for a
social media network as it increases the chances of users
engaging with the site citing that most of them want to express
their feelings freely and it makes people to be immediately
hooked to them as they are addictive. With these in mind,
Verbania, Inc., has to come up with a security plan, security
policy and security solution to the social networking Web site
and application for quality use by the target community
(Rampton, 2017).
Security Plan
Disaster Recovery
Verbania, Inc., should not have any data loss, and thus the
importance of having in place a fundamental procedure to
define step-by-step measures that should be used so as to make
the system or network that was disrupted to recover while the
end goal is to initiate normal operations. The recovery plan will
be that the IT systems as well as networks be recovered from
the disaster by having a set of priorities towards the time factor
whereby the normal operations should be reinstated (Kirvan,
2009).
In the risk management plan, there could be a situation that
might be caused either within the organization, hackers, brought
about by an employee’s device or a user and it should be
assessed (Kirvan, 2009). This is because it could affect the most
critical infrastructure responsible for the day-to-day operations
of the system in place. In terms of viability, competitiveness,
and financial solidness, the organization has to make sure that
the IT system is fully operational (Kirvan, 2009). It is essential
to develop the necessary contingency plan policy where it is a
statement in which the organization will work manually without
the help of the IT system in place to complete the da-to-day
business activities. This will help in giving the system’s
specialist to identify the areas that need to be analyzed. This
will involve the information security officer meeting with the
internal IT, applications, as well as networking administrator
teams so as to establish a situation that is to be investigated
3. (Kirvan, 2009).
Password Creation and Protection
Having a strong password protocol will ensure that the system
is well-protected from cyber-attacks and this applies to every
single component that is used to access and store information
(Steinberg, 2011). The information that users provide when
signing up could be sensitive to the user hence the need to
guard it in the strongest way possible since Verbania, Inc.,
would want that unique passwords be used as they will identify
the users when they want to log in. It implies that when creating
the password, it must be strong enough whereby it should
“contain numbers, letters and symbols.” (Steinberg, 2011).
Remote Access
Only authorized employees of Verbania, Inc., will be given
access to the social Web site and application system citing that
the user information and related data will have to be restricted
for security purposes (Sherry, 2008).
Routers and Switches Security
Verbania, Inc., needs to create and set strong passwords for
their routers and switches because the network to be used will
be getting a lot of traffic and thus could be exposed to certain
network vulnerabilities (Sherry, 2008).
Wireless Communication
Verbania, Inc., will have to create a system that allows smooth
communication with users so that they can be updated with the
current information from any location and it must contain
network security protocols (Sherry, 2008).
Server Security
Verbania, Inc., has to encrypt its server citing that it will be
storing a lot of sensitive data that can only be accessed by
authorized personnel hence it should be stored away from the
organization’s premises to guarantee its security (Sherry, 2008).
Acceptable Encryption
Encryption has to be authorized by the security officers as well
as management and it can only be to a given extend because it
has to be accessed at given time when necessary. Additionally,
4. the encryption should be set in such a way that a single master
file will be stored with the sensitive information (Sherry, 2008).
E-mail
The e-mail address is the most used information by both users
and employees thus the importance of protecting it from access
to unauthorized users who might be aiming at steal information
about the user or Verbania, Inc., itself (Sherry, 2008).
Security Policy
Verbania, Inc., will provide many benefits to its user-base while
it is assess its risk tolerance scale because the representation of
businesses has changed creating a lot of opportunities for
benefits, however, monitoring and measuring the risks involved
is imperative for the organization (Patel & Jasani, 2010). Direct
access to customers will be allowed thus creating an opportunity
for the company to take advantage of the opportunity as a
monetizing its operations, however, there are problems
associated with it as well. Therefore, the way to receive instant
feedback from the clients and customers of the company will be
critical in expanding its business. Verbania, Inc., will also
adopt to the norm of using its platform for hiring and recruiting
since information concerning prospective employees will be
available for employers to get more information prior to hiring
personnel (Patel & Jasani, 2010).
Verbania, Inc.’s security policy will follow that:
· Employees using the system will not be exempted from
privacy when their resources are being used.
· Social network and general technology policies will be
separated.
· Privacy and data security policies will be addressed in length.
· The use of social media to attack, bully, harass, discriminate
or violate the law is prohibited.
· Documenting the policies will be critical in monitoring and
implanting them.
Security
5. Solution
Verbania, Inc., should ensure that when creating an account and
a profile, discussion forums and posting and search capability
for people, they should all ensure the user information is
secured from vulnerable attacks. The gaming component,
calendar component for reminders and instant messaging and
Voice Over Internet protocol (VOIP)-type calling between
friends have to be controlled by the company’s internal systems
that notify the users whenever an issue arises with their account
so as to keep it secure. Verbania, Inc., should also buy a server
that is encrypted and developed with secure account and email
feature to ensure that the system’s operations allow or its
availability seven days a week.
The process of a potential user joining the social networking
Web site for the first time should follow that there is a protocol
set will policies that can collect, store, back up, and mine user
data to better understand users. Furthermore, there have to be
algorithms in place that can integrate collected data with
customer relationship management (CRM) to improve business
and customer support processes. And finally, provide essential
tools that have the ability to analyze user patterns, behavior,
6. and generated traffic to present to advertisers.
Finally, the social networking application must be built on a
system that is strong to allow for account setup and log-in
functionality, creating a profile, add or remove friends, and post
to discussion area. This should be done autonomously without
any hitches.
References
Kirvan, P., F. (2009 September). Minimizing business risk with
disaster recovery audits. TechTarget. Retrieved from
http://searchdisasterrecovery.techtarget.com/feature/Minimizing
-business-risk-with-disaster-recovery-audits
Patel, N., & Jasani, H. (2010). SOCIAL MEDIA SECURITY
POLICIES: GUIDELINES FOR ORGANIZATIONS. Issues in
Information Systems, Volume XI, No. 1, 2010, pp. 628-634.
Rampton, J. (2017, August 25). How to Create Powerful Social
Network Platform in 8 Steps. Inc. Retrieved from
https://www.inc.com/john-rampton/how-to-create-powerful-
social-network-platform-in-.html
Sherry, D. (2008, December 12). How to create a security policy
for social networks. ComputerWeekly.com. Retrieved from
https://www.computerweekly.com/news/2240020792/How-to-
create-a-security-policy-for-social-networks
Steinberg, S. (2011, July 7). 10 Ways to Keep IT Systems
Secure. Entrepreneur. Retrieved from
https://www.entrepreneur.com/article/219954