Planet Of The Grapes Case Study Summary

Powerful Essays
1. The back-office duties are only undertaken by full time staff, but the staff common areas and offices are not locked or physically separated. Front counter/cashier duties are sometimes taken on by full timers but also by casual staff. Physical item such as the RSA token, confidential doc all not locked. cleaners, or other people just tailgate in the office and steal the doc, no one knows.
2. Turnover of casual staff is quite large. No proper documentation of keeping track of part time stuff.
3. Remote access services are enabled on some but not all of the machines. SSH port open, attacker might try to access the SSH by bruteforcing. once the attacker cracked the SSH, they can conduct MITM for the remote access.
4. There is no centralized
…show more content…
Examples like clearances, accounting and confidential document handling are back-office duties that full-time staff must undertake as casual staff may mishandle these duties such as leaking of confidential information like projects of the company, allowing competitors still steal opportunities or leaking intangible accounting data such as profit and loss of the company’s that affects their financial creditability. A log book would be recommended to keep track of every actions done by both full-time and casual staff, duty roster can also be implemented for full-time staff to take turns keeping track of action. Hence proper documentation is very crucial in back-office, keeping track of people who enters the back-office and also, keeping track of documents that have been printed and brought out of the office so that non-repudiation will be in place, preventing the culprit from denying their actions; furthermore, surveillance CCTV is recommended to be installed in the office in order to further enforce …show more content…
Physical item such as company’s stamp, RSA token and electronic devices such as laptop and phone and also, confidential documents are not locked, anyone including cleaners, casual staffs and strangers can tailgate themselves into the office and steal all these items. Trivial yet sensitive information like users’ login credential username and password who carelessly written on memos can be easily stolen on office’s table or can be used to access into the workstations to steal or send out confidential e-documents out of the office’s domain thru email. Hence surveillance CCTV should also be recommended in this area as well in order to enforce

You May Also Find These Documents Helpful

  • Powerful Essays

    221 - Use office equipment

    • 2807 Words
    • 12 Pages

    The computers have lots of important features. A lot of confidential information and documents are kept safe in protected electronic files on the computer such as PAS (patient attendance system). We also have intranet, which I mostly use to access…

    • 2807 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    ERR task B

    • 933 Words
    • 3 Pages

    Data protection: never give out personal information about colleagues or service users to unauthorised people or organisations. Never disclose commercial information about company’s activities to unauthorised people or organisations. Keep all data secure and use my own log in and not share passwords. Any papers, CD’s, portable USB devices should be locked away whenever possible, cabinets and draws that contain sensitive…

    • 933 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the systems/application domain, we must lessen chances for attacks on our servers. This shall be done by figuring out which ports and services are not being used and shutting them off. This gives hackers less ways onto our system. Also needed is to make sure all servers have the latest patches and updates. These updates provide the latest security patches with less likelihood of vulnerabilities.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Keeping our LAN under lock and key prevent tampering of with the networks hardware. Access to the LAN devices is the easiest way to compromise a network. By also applying strict monitoring controls and current security updates are excellent security measures to implement.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    To maintain and monitor quality of our service we keep various records which include daily and night checklists, various reports and assessments. Records and charts are kept for behaviour, health, food, personal care, cleaning and various others. These records are monitored and checked regularly to maintain quality in the workplace.…

    • 739 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nvq Level 3

    • 687 Words
    • 3 Pages

    2.1 show staff that you are a responsible employer with a clear policy for creating a safe and healthy working environment every good employer wants staff to have confidential that it is taking good care to protect them from…

    • 687 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Arnie Grape: Case Study

    • 2239 Words
    • 9 Pages

    I received a call from a Deputy Sherriff in Endora reporting the repeated dangerous activities involving the minor child, Arnie Grape. In my role, I must assess not only the actions of the minor, but I must also assess the living conditions (i.e. family , home, siblings, etc.) and make a recommendation for the child’s future supervision and appropriate sustained support for the family in-residence with the minor.…

    • 2239 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    The Scuppernong Grapes Distribution Company should discontinue business with Don. Don did not act in good faith when requesting a minor to sign a contract. Don may be able to pursue some legal action against the grape distribution company, but it is in a good position to defend itself. Additionally, while Don does not claim to be a Christian and should therefore not necessarily be held to Christian beliefs, Don did not act with integrity or even a strong sense of professionalism in this particular instance.…

    • 926 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Front Office Opperation

    • 1649 Words
    • 7 Pages

    Back offices may be located somewhere other than company headquarters. Many are in areas and countries with cheaper rent and lower labor costs. Someoffice parks such as MetroTech Center provide back offices for tenants whose front offices are in more expensive neighborhoods. Back office functions can beoutsourced to consultants and contractors, including ones in other countries……

    • 1649 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Key Management process

    • 313 Words
    • 2 Pages

    Temporary staff, Housekeeping staff or Security staff will not to responsible for handling the office key(s).…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security is a compelling concern for business and employees. Employers need to establish that they carry out complete risk assessment and address security issues by implementing required security systems. Physical security system is a fundamental component of an establishment, which protects a several aspects such as building security, theft, vandalism and falsification of records. Therefore, organizations and companies need to highly aware of to protect their physical assets. The foundation of a competent security management can prevents such risk like discovering solutions, authorization, and controlling employee’s activities. As a result, organizations can ensure the safety and protection of employees and property.…

    • 1377 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    This can be through a desktop, company laptops, tablets, or any device that connects to the network. Employees should always remember to log off their workstations to avoid unauthorized use as well as not giving out their passwords to co-workers. A good idea is to enable the screen lockout when the desktop is idle. Also block or limit user rights to download, install software, and their access to certain files on the web. This can decrease the threat of viruses, malware, and any harmful files being seen, downloaded, and installed into the system through the workstation. It is very easy for threats to spread throughout the network so it is very important to have a top shelf Anti-virus in place and enable it to scan any CD, DVD, or USB drives inserted into the…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It is important that we keep personal information stored securely, ensuring that confidential information is not unlawfully or inappropriately assessed. This means that we must not leave information hanging around where it may be seen by others and we must use used the lockable cabinets provided by your setting to store information safely; these cabinets should be kept behind a lockable door which should be kept locked whist not in use. We should ensure that our computers have secure passwords which are changed regularly and that and that any IT portable storage and emails are encrypted. Make sure that passwords are not shared and that you log off before letting someone else use the computer…

    • 619 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Task B 307

    • 338 Words
    • 1 Page

    To make sure all records are properly secured you should have passwords on all computers and locks on all filing cabinets, making sure after every use you put paper files away and you lock your computer if you need to leave it. If you were to have visitors in the office were you secure document you should make sure you have put all away and not leave anything on show. When you have locked the cupboards you should keep the key with authorised person.…

    • 338 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Ljb Annual Report Sample

    • 1189 Words
    • 5 Pages

    Establish responsibility for things such as petty cash tills and make sure there is a segregation of duties among related activities. Continue to utilize documentation procedures to uphold the integrity of the filing system. Use physical controls such as locks and safes to safeguard company assets. In addition, independent internal verification of the items mentioned will serve as a “double checker” to catch any errors and report discrepancies. Finally, the new human resource controls will verify that those being hired will meet the requirements of the…

    • 1189 Words
    • 5 Pages
    Powerful Essays