Many
organizations now a days use Key Performance Indicators (KPIs) to measure the
performance of their IT services. Here are some benefits of Performance
management systems:
·
It
is to ensure that the IT infrastructure is working in line with the company’s
goals
·
Performance
metrics helps company in analysing its business process and their effectiveness
·
It
also helps in evaluation of achievements and how its effects company’s future
goals
·
Performance
metrics also helps in allocation and management of resources
·
It
can also help in identifying underutilized resources
·
It
can also help in forecasting future demand and thus helping in decision making
·
It
helps in budgeting and how much budget each department will require
·
It
helps in prioritizing tasks
·
It
also helps in identifying training needs for employees
·
One of the major benefits of
IT performance management is that it helps in mitigating the risks that
organization can face
·
IT performance management
tools can help in identifying bugs or irregularities in the system that my
cause failure
·
It also acts as a management
control system by providing metrics about their performance (Juneja, n.d.).
Should Performance
Metrics be Copied from other Enterprises?
Performance metrics are
unique to each organization due to uniqueness of their structures and
objectives. Enterprises differ in terms of their goals and objectives. Their
organizational structures are also different. It is due to these differences we
can’t apply same performance metrics into different enterprises. Every
enterprise has its metrics according to its objectives. Every organization has
its own culture and that demands customized performance evaluation system.
Every enterprise has different type of risk factors that are unique to that
enterprise. Risk assessment is also different due to that reason. Also,
performance metrics are greatly affected by geopolitical and economic
situations of the county in which enterprise is performing its operations.
Each organization goes for a unique business model so
that it can distinguish itself from its competitors. Applying same performance
metric will create discrepancies and results will not be accurate. Performance
metrics should be customized to that particular organization for accurate
results. Decision making process requires accurate metrics which cannot be
achieved with copying metrics from another enterprise. Products and services
offered by enterprises also are also different which emphasizes the use of
customized performance management system. We can’t apply performance management
system of another enterprise to our enterprise because of our unique goals and
objectives. Even if there are similarities, we will need to customize the
performance management system according to our organizations operational
requirements. The risk factors of the enterprises are also not the same which
is also a big factor for not copying the same performance management system. Performance
management system are designed to focus on specific operational activities of
enterprises thus making it difficult to apply same performance system. If an
organization needs to maximize its profit it needs a system which shows
accurate results and performance of its organization which is only possible
with a customize performance management system. (Bakshi, 2016)
Task 2
d. What is the vulnerability being
exploited?
The vulnerability being
exploited in wifi is WPA2 security protocol. This protocol protects and secures
your information while you are using wifi. If you are using router that is
using WPA2 security protocol, then you are vulnerable to attack. It doesn’t matter
what kind of router it is as long as it is using WPA2 protocol. Also, your weak
password is also a vulnerability. Even if the encryption is strong, a weak
password can increase your chances of getting hacked (Krackattacks, 2017).
e. What information or data can be gained
by a hacker exploiting this vulnerability?
The attacker can see your
encrypted information which was assumed to be safe. It can include your credit
card numbers, passwords, messages, emails, photos etc. The hacker can then use
this information for illegal purposes. He can also monitor your data usage
internet search history. Also, hacker can get information about your employment
record, medical history, financial data and your shopping history as well. These
are all sensitive information that hacker can exploit and can use against you.
Hacker can sell your sensitive information online or put it on the dark web. They
can mimic your identity online. Lots of previous major cyberattacks are related
to identity theft.
f. How is the hack performed?
Without proper encryption
your information can be captured and analysed by hacker. Attacker uses a
technique called key reinstallation attacks (KRACKs) to bypass WPA2 security
protocol. This attack works against all WPA2 protected wifi networks. Hacker
can also gain access by exploiting weak configuration of network and can
manipulate your sensitive information. Also, he can inject malware or
ransomware to exploit you. Some hackers rely weak passwords and exploit that.
Even if your encryption is strong a weak password can undermine that. If you
are using a free public wifi network there is chances that it is a rouge
network which is specifically created to lure you into giving your sensitive
information. It imitates itself as a legitimate wifi network which makes us
think it is legitimate (Norton, n.d.).
g. What about this particular hack
interested you specifically?
This hack can be used to strengthen security of Iot’s
network. This hack can attack millions of devices at the same time because lots
of electronic devices use wifi for connection. This hack enables gives you
access to private data which pushes security companies to strengthen their
security protocols. Wifi is used by multiple electronic gadgets and Iot’s which
enables system wide hack. This can give control of the whole house. The hack
can be used to share your bandwidth and use it for legitimate purposes such as
bitcoin mining. The hack can be designed into a program that is used to divide
network bandwidth and use it for research purposes.
h. How do you think this particular hack
could be mitigated?
We can avoid being hacked by following these tips:
·
We can mitigate
this risk by avoiding public wifi hotspots and using a Virtual private network
(VPN) when surfing and online shopping
·
Avoid logging into websites and putting
sensitive information like credit card number when using a public wifi hotspot
·
Keeping the software on your laptops and
smartphones up to date
·
Visiting only those websites that are secure and
follow latest safety standards
·
You can disable auto connect to avoid connecting
to unknown wifi networks
·
Using strong password that include numbers
symbols and or a combination of that
·
Frequently change your router’s admin
credentials to avoid getting hacked
·
Get latest updates for you wifi router which can
patch security issues (Kinzie, 2020)
References of Benefits of IT
Performance Management
Bakshi, S., 2016. Performance Measurement Metrics
for IT Governance. [Online]
Available at: https://www.isaca.org/resources/isaca-journal/issues/2016/volume-6/performance-measurement-metrics-for-it-governance
Juneja, P., n.d. Benefits
of a Performance Management System. [Online]
Available at: https://www.managementstudyguide.com/benefits-of-performance-management-system.htm
[Accessed 13 April 2020].
Kinzie, K., 2020. 7
Wi-Fi Security Tips: Avoid Being Easy Prey for Hackers. [Online]
Available at: https://www.varonis.com/blog/7-wi-fi-security-tips-avoid-being-easy-prey-for-hackers/
[Accessed 13 April 2020].
Krackattacks, 2017. Key
Reinstallation Attacks. [Online]
Available at: https://www.krackattacks.com/
[Accessed 13 April 2020].
Norton, n.d. Why
Hackers love public Wi-FI. [Online]
Available at: https://us.norton.com/internetsecurity-wifi-why-hackers-love-public-wifi.html
[Accessed 13 April 2020].