Marvin HugleySec 200 Intro To Network SecurityInstructor: Q Miller 11/15/15Security Managing a small coffee shop you can have tons of system threats. One threat is Wi-Fi. Since your Wi-Fi is going to be public anyone can connect to it. Which means that someone can come into your shop and steal your packets or they can come into your shop and hack into your system. Once there in your system they can take all of your staff and customers information.
An attacker could also put a virus on your system such as a worm. Ron Teixeira says according to a recentSymantec Threat Report, 82% of data that was either lost or stolen could have been avoided if the business followed a simple cyber security plan. One way to protect yourself from attacks are firewalls. A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both.Order now
One of the biggest threats are your employees. Why? Your employees are human and because of that they make mistakes. You could also have an employee that gets mad because they didn’t get the promotion they thought they deserved. Most importantly it is the employee that knows how everything works.
Getting to the system wouldn’t be hard for them especially if they have a key card for that area or if they are one of the people that work in that area. Having employees is always a risk. So what they do is leak out all your customers information. Your business can have Maliciousthreats consist of inside attacks by disgruntled or malicious employees and outside attacks by non-employees just looking to harm and disrupt an organization. Your data in your business should be encrypted. This makes it harder for the person to get and read that information.
Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties (Margret Rouse). SecurityThere is 55,246 Coffee shops in the United States Of America. Starbucks alone makes 10. 7 billion a year.
Starbucks has 16,850 stores. Starbuck is probably the number one place a attacker would attack. One reason why is because it is a big corporation. Hackers love to attack big business because it will be reported on the news, by it being reported on the news the hacker is getting publicity.
Another reason why a hacker would go after Starbucks is because everyone goes there. It is a easy place to attack or be attacked. One thing you can do is use a VPN ( Virtual Private Network) AVPN, or virtual private network, is a network that is constructed by using public wires usually the Internet to connect to a private network, such as a company’s internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
(Vangie Beal) . Your business might get emails with attachments. If you don’t know the email address then don’t open it. That email might be infected with a virus worm or malware. ‘Malware’ is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.
A virus is a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. The best way to protect yourself on a Windows PC is to have two accounts. Have a standard account and then have a Admin Account. Do everything on the Standard account. By doing this if you accidently click on something or download something you won’t get infected.
The reason for this is because it needs Admin rights to install on your pc. If you want to go to a site that your not confident in or download something that might have a virus. You can always install a VM Virtual Machine. With all these threats your going to need some type of backup plan. A plan B.
If I had a business my plan would be to make sure I run backups every night at like 8 oclock. I pick that time because no one should be at the office. Never run your backups when you know a lot of people will be in the office. It will slow your network down. I would not allow my employees to plug anything into the Computers like USB.
They might just bring in a virus and crash my whole network. Security Posture is your overall security plan – the approach your business takes to security, from planning to implementation. It is comprised of technicalandnon-technical policies, procedures and controls, that protect you from both internal and external threats. No business, large or small, is safe from potential security breaches. Anyone is fair game.
These are the reasons why you need to worry. Hackers – Hackers scan networks for vulnerable systems that can be easily breached for malicious purposes. This can result in compromised data that, in turn, can cause lost customer confidence. Disgruntled Employees – Employees bearing a grudge could easily walk out your door with company data on removable media.
They could send internal company data to an external source (ie. FTP, SSH, or email server) or simply destroy company data from within. Script Kiddies – Typically inexperienced hacker wannabes use tools which are freely available on the Internet (ie. LOIC – Low Orbit Ion Cannon or BackTrack 5). In the wrong hands, these tools can cause significant damage.
Spammers – Exploit vulnerable email systems to relay spam email through your network infrastructure, often resulting in a network outage due to the traffic generated from your compromised network. Referenceshttp://smallbiztrends.com/2007/06/top-five-small-business-internet-security-threats.htmlhttp://www.webopedia.com/TERM/F/firewall.htmlhthttp://searchsecurity.techtarget.com/definition/encryptiontps://msdn.microsoft.com/en-us/library/cc723507.aspx#XSLTsection123121120120http://www.webopedia.com/TERM/V/VPN.htmlhttps://darrylmacleod.wordpress.com/2012/03/09/what-is-security-posture/