Preview

Planet Of The Grapes Case Study Summary

Powerful Essays
Open Document
Open Document
1647 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Planet Of The Grapes Case Study Summary
1. The back-office duties are only undertaken by full time staff, but the staff common areas and offices are not locked or physically separated. Front counter/cashier duties are sometimes taken on by full timers but also by casual staff. Physical item such as the RSA token, confidential doc all not locked. cleaners, or other people just tailgate in the office and steal the doc, no one knows.
2. Turnover of casual staff is quite large. No proper documentation of keeping track of part time stuff.
3. Remote access services are enabled on some but not all of the machines. SSH port open, attacker might try to access the SSH by bruteforcing. once the attacker cracked the SSH, they can conduct MITM for the remote access.
4. There is no centralized
…show more content…
Examples like clearances, accounting and confidential document handling are back-office duties that full-time staff must undertake as casual staff may mishandle these duties such as leaking of confidential information like projects of the company, allowing competitors still steal opportunities or leaking intangible accounting data such as profit and loss of the company’s that affects their financial creditability. A log book would be recommended to keep track of every actions done by both full-time and casual staff, duty roster can also be implemented for full-time staff to take turns keeping track of action. Hence proper documentation is very crucial in back-office, keeping track of people who enters the back-office and also, keeping track of documents that have been printed and brought out of the office so that non-repudiation will be in place, preventing the culprit from denying their actions; furthermore, surveillance CCTV is recommended to be installed in the office in order to further enforce …show more content…
Physical item such as company’s stamp, RSA token and electronic devices such as laptop and phone and also, confidential documents are not locked, anyone including cleaners, casual staffs and strangers can tailgate themselves into the office and steal all these items. Trivial yet sensitive information like users’ login credential username and password who carelessly written on memos can be easily stolen on office’s table or can be used to access into the workstations to steal or send out confidential e-documents out of the office’s domain thru email. Hence surveillance CCTV should also be recommended in this area as well in order to enforce

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lock the servers into their own room with keycard or fingerprint access only. Only authorized IT staff shall have access. Management, vendors and all other authorized guest shall be escorted by an authorized IT staff member. Video surveillance should be maintained and monitored at all access…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the systems/application domain, we must lessen chances for attacks on our servers. This shall be done by figuring out which ports and services are not being used and shutting them off. This gives hackers less ways onto our system. Also needed is to make sure all servers have the latest patches and updates. These updates provide the latest security patches with less likelihood of vulnerabilities.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    As with any other system, all data needs to be kept secure. Employee confidentiality is of paramount importance, particularly in a system that hold and utilizes potentially sensitive personal employee information. Moreover, seemingly innocuous information such as standards and procedures within the company also need to be kept secure. Any secure, sensitive, or proprietary information should be encrypted and password…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Scuppernong Grapes Distribution Company should discontinue business with Don. Don did not act in good faith when requesting a minor to sign a contract. Don may be able to pursue some legal action against the grape distribution company, but it is in a good position to defend itself. Additionally, while Don does not claim to be a Christian and should therefore not necessarily be held to Christian beliefs, Don did not act with integrity or even a strong sense of professionalism in this particular instance.…

    • 926 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    221 - Use office equipment

    • 2807 Words
    • 12 Pages

    The computers have lots of important features. A lot of confidential information and documents are kept safe in protected electronic files on the computer such as PAS (patient attendance system). We also have intranet, which I mostly use to access…

    • 2807 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Security is a compelling concern for business and employees. Employers need to establish that they carry out complete risk assessment and address security issues by implementing required security systems. Physical security system is a fundamental component of an establishment, which protects a several aspects such as building security, theft, vandalism and falsification of records. Therefore, organizations and companies need to highly aware of to protect their physical assets. The foundation of a competent security management can prevents such risk like discovering solutions, authorization, and controlling employee’s activities. As a result, organizations can ensure the safety and protection of employees and property.…

    • 1377 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    To maintain and monitor quality of our service we keep various records which include daily and night checklists, various reports and assessments. Records and charts are kept for behaviour, health, food, personal care, cleaning and various others. These records are monitored and checked regularly to maintain quality in the workplace.…

    • 739 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Access Control Simulation

    • 698 Words
    • 3 Pages

    Cubicle 2-1 had a pre-approved offsite equipment request posted This should be secured to prevent an unauthorized person from stealing equipment. Both cubicle 2-1 and 2-2 had fingerprint scanners. Cubicle 2-3 had a locked file drawer and the computer was password protected as it locked after four attempts. Cubicle 2-4 did have a UPS but there was a flashdrive on the desk as well as login information on a post it note. Flashdrives should be encrypted and increased controls surrounding password/login information should be enforced. Password/login…

    • 698 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    ERR task B

    • 933 Words
    • 3 Pages

    Data protection: never give out personal information about colleagues or service users to unauthorised people or organisations. Never disclose commercial information about company’s activities to unauthorised people or organisations. Keep all data secure and use my own log in and not share passwords. Any papers, CD’s, portable USB devices should be locked away whenever possible, cabinets and draws that contain sensitive…

    • 933 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Arnie Grape: Case Study

    • 2239 Words
    • 9 Pages

    I received a call from a Deputy Sherriff in Endora reporting the repeated dangerous activities involving the minor child, Arnie Grape. In my role, I must assess not only the actions of the minor, but I must also assess the living conditions (i.e. family , home, siblings, etc.) and make a recommendation for the child’s future supervision and appropriate sustained support for the family in-residence with the minor.…

    • 2239 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Let’s look at confidentiality which is one of the most important measures to maintain safety and security. Not following procedures according to Data Protection Act 1998, which objectives aim at secure data processing and storage, may result in legal action against employers. These procedures may vary depend on the nature of the business. Nowadays vast majority of the business relay on computerised filling system, therefore, employers must take every necessary measure to protect that system from for example, hackers. Employees, on the other hand must follow all procedures to ensure they use system correctly and legally. Consequently, not following health, safety and security procedures may also lead to economic crises of an organisation, for example, court may order to pay very high fine or close down the business and loss of the customers. Moreover, an employer who failed to follow health, safety and security procedures where as a result employees are getting harmed at work is highly likely to be exposed to organisational grievance or disciplinary procedures. For example, in a care home failure to provide moving and handling training to induction staff would have catastrophic consequences such as: spine injuries acquired by using incorrectly equipment or by not using it at all when necessary or even a death of a care taker if handled inappropriately using unsecured hoist. This scenario would not…

    • 335 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It is important that we keep personal information stored securely, ensuring that confidential information is not unlawfully or inappropriately assessed. This means that we must not leave information hanging around where it may be seen by others and we must use used the lockable cabinets provided by your setting to store information safely; these cabinets should be kept behind a lockable door which should be kept locked whist not in use. We should ensure that our computers have secure passwords which are changed regularly and that and that any IT portable storage and emails are encrypted. Make sure that passwords are not shared and that you log off before letting someone else use the computer…

    • 619 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Basic Bookkeeping

    • 518 Words
    • 3 Pages

    The process is to record each journal entry into the general ledger. A general ledger…

    • 518 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Front Office Opperation

    • 1649 Words
    • 7 Pages

    Examples of back-office tasks include IT departments that keep the phones and computers running (operations architecture), accounting, and human resources. These tasks are often supported by back-office systems: secure e-commerce software that processes company information (e.g., databases). A back-office system will keep a record of the company’s sales and purchase transactions, and update the inventory as needed. Invoices, receipts, and reports can also be produced by the back-office system.…

    • 1649 Words
    • 7 Pages
    Powerful Essays