Icanread Systems Inc
At the beginning of the 21st century, it was known that websites were used majorly for entertainment purposes. However, in the contemporary world, organizations use websites to run their day-to-day operations. This makes it essential for these website platforms to be as secure as possible. The technological transitions experienced in the modern world have often posed significant threats to websites’ utilization in business-oriented activities (Schoenfield, 2015, p. 153). These challenges have exposed organizations’ information systems to hazards because they are exposed to people with different intentions. In the case of Icanread System, Inc., I will assess and determine whether the company’s system is secure for the company’s database to be connected to the parent company’s database.
Are you interested in obtaining a unique copy of the “Icanread Systems Inc”? Get in touch with us.
Examining the SSL Certificate
The first step I will take to determine whether the Icanread System, Inc. website is secure is to examine its SSL certificate. A secure URL begins with “HTTPS” instead of “HTTP.” The extra “S” in the first URL denotes the system is “secure.” This also implies that the website uses the Secure Sockets Layer (SSL) Certificate (Schoenfield, 2015, p. 155). An SSL certificate is essential because it secures all the data transferred from the browser to the website’s server. The other way I would assert the security of the company’s database is by checking whether there is a small padlock before the address of the organization’s blog. The small padlock indicates that the company’s site is secure and that third-party individuals cannot intercept the communication between an employee and the company (Schoenfield, 2015, p. 156). The absence of an SSL certificate makes personal data easily accessible to hackers. Apart from keeping the company secure, the presence of an SSL certificate also ensures that the company occupies a better position as far as ranking by Google, making it appear at the top list of search results.
Analyzing If the Site Contains a Modern Theme
The second phase of the assessment will entail evaluating if the company’s website has a modern theme. Themes refer to anything that makes up a website and is made through a code. Over time, some of the website’s settings written using different codes may become obsolete, making the page vulnerable to attacks from third-party individuals. Based on an article published in 2020 by G1, it was discovered that more than one million WordPress sites were vulnerable to different forms of plugins and themes (Schoenfield, 2015, p. 157). While this does not mean that these platforms are worse than others, it calls for these website owners to be cautious in selecting themes and plugins to avoid risking confidential data held by the organization. I would evaluate the website of Icanread System to establish whether pirated systems were used in their web design. If pirated themes were used, the website would be insecure because they often leave open doors for invaders to infiltrate.
Adopting Security Tools in Examining the Site
The computers used at Icanread System Inc. may have antivirus software installed on them. This software goes a long way in indicating the safety of the website. In some instances, these tools prevent navigation from proceeding, especially when there is no security certificate at the address or if it has already expired (McManus, 2023, p. 23). To execute this stage, I would paste the company’s website into the Virus Total search field to determine whether there are any risks to the visitors. The other tool I would apply with my team is Google Safe Browsing. The advantage of using Google Safe Browsing is that it uses Google’s database, which often analyzes billions of pages, increasing the ability to identify malicious sites or reduce the likelihood that information would be stolen from these addresses (McManus, 2023, p. 28).
Checking the URL
I will also advise my team to examine the company URL with much caution to identify any issues that may be related to them. If the URL has a missing letter, contains a typo, or in some instances, has serious grammatical errors, then this would signify that the site is not secure and, thus, should not connect to the parent company’s database. In some cases, fake addresses often replace characters, for example, by changing the “o” to zero (McManus, 2023, p. 31). When someone is in a hurry, G0ogle.com may need to draw their attention to the replacement in these distinct but same characters.
Security Seals
Many employees are known to trust sites that have security seals. However, it would be advisable to be cautious because it is easy to create a fake stamp by adopting editing programs, after which they can be inserted on the pages. I will go out of my way to validate the authenticity of the seal by clicking on it and checking whether it redirects me to the website of the company responsible for offering these stamps. If the symbols are fake, the images cannot direct someone to the company responsible for these seals.
Finding Out Who Owns the Site
Establishing the site’s owner is the sixth stage I would have to take. This is a straightforward step because every website must be registered in the name of an individual or legal entity (Loshin, 2013, p. 4). I would log in to the search field of Whois Lookup and find the website’s owner, as this serves to make the website safe from third-party infiltration.
Escape Spam
Lastly, there are various aspects to watch out for in a website to determine its insecurity status. A website with exaggerated promises, banners blinking incessantly, and meagre product prices are signs of unsafe use (Loshin, 2013, p. 7). While a safe website protects confidential information from hackers, users must browse safely.
References
Loshin, P. (2013). Simple steps to data encryption: a practical guide to secure computing. Newnes.
McManus, S. (2023). Web design in easy steps. In Easy Steps Limited.
Schoenfield, B. S. (2015). Securing systems: Applied security architecture and threat models. CRC Press.
ORDER A PLAGIARISM-FREE PAPER HERE
We’ll write everything from scratch
Question
Icanread System, Inc. is an advertising agency that specializes in selling ad spaces in their parent company’s magazine. Icanread Systems, Inc. manages an online database that allows its customers to upload and pay for their business ads for magazine placement. Because Icanread Systems, Inc.’s database needs to connect to the parent company’s database, the parent company has requested that the Icanread Systems, Inc. network be assessed and verified as secure.
Your company has designated you to be the lead architect for this project because it’s a small company and perfect for your first time. Since you have spent the past 7 weeks in training to be a System Architect, perform your assessment. Use headers to separate the sections of information.
Submit your report in an APA-formatted paper (Title page, body, and references only). Your report should have a minimum of 600 words. Count the words only in the body of your response, not the references. A table of contents and abstract are not required.
A minimum of two references are required. One reference for the book is acceptable but multiple references are allowed. There should be multiple citations within the body of the paper. Note that an in-text citation includes the author’s name, year of publication, and the page number where the paraphrased material is located.