Security Policies

The following sample Information Technology case study is 673 words long, in APA format, and written at the undergraduate level. It has been downloaded 677 times and is available for you to use, free of charge.

Recently there have been several security breaches in my company’s IT infrastructure. As a 44-year-old senior systems administrator, I have never come across such horrific crimes in my entire life. How people have the cheek to commit such acts in today’s society is beyond me. It simply reiterates the evil that man is capable of. I apologize if I have been going off on these criminals, but I am somewhat disillusioned with mankind at this moment in my life. I will now explain to you some valid solutions so that that we may prevent these future acts of cyber warfare, cyber terrorism, and bullying.

Intel within my company reveals to me that one of the reasons that there have been security breaches has been due to hacked passwords. Several of our company’s employee’s accounts have been hacked into. Since we deal with high-level research, people will always want to find information within our systems. We have seventy-three employees here at Microsoft. Anyone of these employees may have been drunk at a bar and told some cyber terrorists our database passwords. According to UC Santa Cruz (2013), it is important to have “good, cryptic passwords that are difficult to guess, and keep them secure”. As of today, we are going to change everyone’s passwords in the system and replace them with good, cryptic passwords that these cyber terrorists won’t remember even if someone told it to them five thousand times. 

According to UC Santa Cruz (2013), it is also imperative that people “don’t reveal or share passwords”. I have figured out a solution to this. Every Friday after work, every single employee will take a lie detector test in order for me to see whether they may have told anyone company passwords. If I find out that they have, their punishment will be more than severe. They will simply be fired from the company and I will make sure they never work in this industry again. I apologize if I sound harsh but I have had to answer to people above me that have been a lot worse than unpleasant.

Another strategy that I came up with myself is that I am going to reset the passwords for the system every day. This way passwords will never be compromised and it will drastically reduce the risk of the system being hacked. 

Since some of our problems have arisen from social media, I have decided to terminate all social media sites for this company. Our company does so well that even if we terminate all our social media sites, we will still make a big profit. Social media has many downsides. It is easy for hackers to obtain passwords if they go through social media sites. Liking comments on Facebook may be fun, but there is a great peril to it.

Even our programs are not immune to viruses. Viruses can always lead to our security gates being opened. According to UC Santa Cruz (2013), it is imperative that we use up-to-date technologies and “install anti-virus and anti-spyware software and make sure that these programs are always up to date”. Something else that I will tell all my employees is that they must not click on unknown or unexpected links or attachments. These cannot only infect the computers at the office, but they could also lead to our passwords being hacked. According to UC Santa Cruz (2013), it is also vital that our employees “do not open files sent via IM or P2P software since these files can bypass anti-virus screening”.

I will make sure that such security breaches never happen again. If they do, Sally might lose her job. In case you didn’t know, her son has leukemia. She has been very nice to me ever since I started working here and I will do everything in my power so that she does not lose her job. 

Reference

Regents Of The University Of California. (2013). Security breach examples and practices to avoid them. University of California Santa Cruz.