Free Creative Writing On Business

Published: 2021-06-22 00:47:31
essay essay

Category: Internet, Banking, Sports

Type of paper: Essay

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hey! We can write a custom essay for you.

All possible types of assignments. Written by academics

GET MY ESSAY
This company is vulnerable to spam that increases running costs and sending or receiving of messages that may not have compelling content. The use of emails contributes to fraud where the senders hide their true identity or use passwords to access files. Email usage has been associated with viruses that affect key data or browser. Emails also expose an organization to the risk of online hackers who may cause havoc in the operating systems, steal, modify or even delete the critical data (Sherman, 2003).
Safety on email usage requires regular update of the computers. This increases software security, fixes all loopholes and updates the antivirus firewalls and software that protect against hackers and viruses. Appropriate antivirus software and filters should be put in place. Knowledge on snopes to detect spam and on opening executables sent on email should be emphasized (Sherman, 2003). However, this requires integrity and trust from the employees which may be difficult to determine. The use of email policy also by printing sent and received mails or storing such in hard drives, reduces the risk. This is amongst the safest ways, but it is expensive due to the IT and printing costs associated with it.
Management of a sports arena requires use of credit cards to reduce forgery of tickets and unnecessary queues. This requires software that detects available credit and the amount of time to be spent in the arena (Sherman, 2003). The 3PL Central software may be efficient in such a case. The only shortcoming on the use of this software may be the privacy factor and the configurations needed to match with the operations of a sports arena. However, this is solvable by centralizing all the transactions.
Reference.
Sherman, J. (2003). Internet Security. Turtleback Books: Texas.

Warning! This essay is not original. Get 100% unique essay within 45 seconds!

GET UNIQUE ESSAY

We can write your paper just for 11.99$

i want to copy...

This essay has been submitted by a student and contain not unique content

People also read