Question
Gladlus is a fast-growing business that sells kitchen cutlery and silverware. They recently moved into new office premises. With their growing reputation and market presence,
Gladlus is a fast-growing business that sells kitchen cutlery and silverware. They recently moved into new office premises. With their growing reputation and market presence, they were very excited about their new glass wall ground floor premises, so that everyone could see their operations and learn more about what they do. The new site is in a big new shopping complex that was recently opened in a new estate and will generate a lot of exposure for the business. While they were moving they also invested in the latest computer technology. All staff has been given wireless laptops that are password protected. Employees must change their password every three months and the business has strict policies on password format and content.
The main computer is in a prime spot on the ground floor premises since the computer provider - a well-known brand - offered Gladius a discount if they were willing to be seen using their brand of machines. Their le with the shopping complex also allows them to use the building's public wi-Fi network although this can be slow if a large number of store visitors are logged on. The .i-Fi was seen as a positive by Gladius since the business did not have to invest in its own communications infrastructure, allowing it to keep its costs down. They plan to develop their own network in the next 6-12 months.
Because it was a new building in a new estate, there have been several short power disruptions that have cut the shopping center's power supply and Wi-Fi. A few unknown people with laptops have also recently been spending a lot of time in the coffee shop next door and are always keen to talk to Gladi employees and ask about the computers and technology being used. One of them even bought the l assistant lunch so they could chat for longer
identify two (2) threats that Gladius faces. For each identified threat: i. Briefly describe the consequence that results from this threat ii. Suggest a strategy that could be used to reduce the exposure you identified in parts (i) and (ii) and briefly explain how it addresses the problem.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started