You are on page 1of 35

REPUBLIC OF CAMEROON REPUBLIQUE DU CAMEROUN

PEACE-WORK-FATHERLAND PAIX-TRAVAIL-PATRIE

MINISTRY OF HIGHER MINISTERE D’ENSEIGNEMENT


EDUCATION SUPERIEUR

LAUREATE HIGHER INSTITUTE OF BUSINESS ADMINISTRATION

IMPACT OF NETWORK SECURITY TO AN


ORGANISATION

CASE STUDY: FIRE SOFTWARE

AN INTERNSHIP REPORT CARRIED OUT IN PARTIAL FULFILMENT


OF THE REQUIREMENTS FOR THE AWARD OF A HIGHER NATIONAL
DIPLOMA IN COMPUTER SCIENCE AND NETWORK

PRESENTED BY
CHICK POOH CONRAD JORDAN

FIELD SUPERVISOR ACADEMIC SUPERVISOR


MR. MBAH SINCLAIR MR. DIFOUO JEAN PATRICE

ACADEMIC YEAR 2021/2022


i
CERTIFICATION

This piece of work has been written to fulfill the requirements of obtaining a Higher National
Diploma (HND) in Computer Science and Networks.

PRESIDENT

Date

EXAMINER

Date

SUPERVISOR

Date

ii
DEDICATION

To my late mother Mrs. Achu Beatrice Fri

iii
ACKWOLEDGEMENTS

Firstly, I wish to thank my supervisor Mr. Difouo Jean Patrice who was patient enough to
guide me throughout this research session and who gave me some information needed for the
realization of this research. Secondly, I wish to appreciate Mr. Mbah Sinclair my field supervisor
who guided me on what to do as an intern during the period of internship. Special to my school
for providing me with the knowledge needed for this course. My regards also goes to my
classmates and course collaborators for their contributions in various ways towards the
completion of this work. I finally give thanks to my family members for their financial and moral
support.

iv
TABLE OF CONTENTS

CERTIFICATION ........................................................................................................................ ii
DEDICATION.............................................................................................................................. iii
ACKWOLEDGEMENTS ........................................................................................................... iv
TABLE OF CONTENTS ............................................................................................................. v
TABLE OF ABBREVIATION .................................................................................................. vii
CHAPTER ONE ........................................................................................................................... 0
INTRODUCTION......................................................................................................................... 0
General Introduction................................................................................................................................. 0
1.1 Background Of The Study.............................................................................................................. 0
1.2 Objective Of The Study ................................................................................................................. 1
1.2.1 General Objectives ................................................................................................................ 1
1.2.2 Specific Objectives ....................................................................................................................... 2
1.3 Definition Of Key Terms ................................................................................................................ 2
CHAPTER TWO .......................................................................................................................... 4
PRESENTATION OF THE ORGANIZATION ........................................................................ 4
2.1 Historical Background ......................................................................................................................... 4
2.1.1 Date And Content Of Creation ..................................................................................................... 4
2.1.2 Geographical Location ................................................................................................................. 4
2.1.3 Lay Out And Equipment ............................................................................................................... 4
Layout.................................................................................................................................................... 4
2.1.4 Working Condition ....................................................................................................................... 5
2.2 Organigram Of The Organization ........................................................................................................ 5
.................................................................................................................................................................. 5
2.3 Products And Services ......................................................................................................................... 6
2.4 Administration .................................................................................................................................... 7
2.5 Objectives............................................................................................................................................ 8
CHAPTER THREE ...................................................................................................................... 9

v
INTERNSHIP ACTIVITIES ....................................................................................................... 9
3.1 Reports on activities............................................................................................................................ 9
3.2 Problems Or Difficulties Encountered During The Attachment ........................................................ 20
CHAPTER FOUR ....................................................................................................................... 21
SITUATION ANALYSIS ........................................................................................................... 21
4.1 Organizational strength and weaknesses ......................................................................................... 21
4.1.1 Strengths .................................................................................................................................... 21
4.1.2 Weaknesses................................................................................................................................ 21
4.2 Organizational opportunities and threats ........................................................................................ 22
4.2.1 Opportunities ............................................................................................................................. 22
4.2.2 Threads....................................................................................................................................... 22
CHAPTER FIVE ........................................................................................................................ 24
SUMMARY OF FINDINGS AND RECOMMENDATION ................................................... 24
5.1 Summary and conclusions ................................................................................................................ 24
5.2 Benefits from the attachment .......................................................................................................... 24
5.3 Recommendation.............................................................................................................................. 25
REFERENCES ............................................................................................................................ 26

vi
TABLE OF ABBREVIATION

HDD……………………………………………HARD DISK DRIVE

ODD……………………………………………OPTICAL DISK DRIVE

CMOS…………………………………………COMPLEMENTARY METAL OXIDE SEMICONDUCTOR

RAM……………………………………………RANDOM ACCESS MEMORY

CPU…………………………………………….CENTRAL PROCESSIN UNIT

PSU…………………………………………….POWER SUPPLY UNIT

RJ-45…………………………………………..REGISTERED JACK 45

LED…………………………………………….LIGHT EMITTING DIODE

DVD……………………………………………DIGITAL VERSATILE DISC

USB…………………………………………….UNIVERSAL SERIAL BUS

MODEM……………………………………..MODULATOR-DEMODULATOR

WAN…………………………………………..WIDE AREA NETWORK

LAN…………………………………………….LOCAL AREA NETWORK

vii
CHAPTER ONE
INTRODUCTION

General Introduction

An internship is a period of work experienced offered by an organization to a trainee for a


limited period of time. They are typically undertaken by students and graduates looking to gain
relevant skills and experience in a particular field of work. Employers benefit from these
placements because they often recruit employees from their best interns, who have known
capabilities, thus saving time and money in a long run. While on the other hand, the interns turn
to benefit from the services offered by the organization there by increasing their performances in
the practical domain of their field. During my internship period, I got to be involved in the field
work and also got to do a lot of things that were mostly theoretical in class. I had the chance to
work in my departmental field with Fire software that are specialized in networking,
development of software, graphics design, computer maintenance and also the sales of computer
and accessories. My experience at Fire software helped me realize my potentials like my team
spirit, my devotion to work, my passion, good communication and good understanding of
colleagues feelings. This training provided me with the opportunity to broaden my knowledge,
acknowledge my strengths and weaknesses that would be more helpful to shape up my career in
the future. This internship started on the 3rd of August 2021 and ended on the 28th of August
2021 which made me to choose this topic gain more knowledge on the impact of network
security to an organization.

1.1 Background Of The Study

This will provide context to the information discussed throughout the research. It links the
introduction of your research topic and ensures a logical flow of ideas.
Computer and network security breaches are commonplace, and several occur around the
world every day. Some are considered minor, with little loss of data or monetary resources, but
many of them are considered major or even catastrophic. As the world becomes increasingly
dependent on the internet to do everything, we are part of a growing computer networks. Data
become one of the biggest dilemmas we need to face today. One of the ways your data may be
vulnerable, is if your network is insecure.
When you are working on a network, all of the data that passes through it relies on the
network itself to be secured enough not to let anyone one but the intended recipient access the
data. Whether you are over a wired LAN network or WIFI, both are susceptible to being
attacked.
If you are working over a network that isn’t secure, a hacker can potentially hack the entire
network and that will give them access to everything that is being communicated over the
network and they can alter the data in the network if they desire. But if you have a secured
network, not only will it filter out spyware, but it also adds layers of protection against any
potential cyber-attacks. It does so by breaking down all the data that’s travelling in and out of the
network into several small packets. It then encrypts each packet separately and then sends it out
through multiple channels. This way, even if some tries to get into your system, they will never
have access to all of your data in one place.
You might have heard of the 2014 hacking of Sony Pictures’ network, which the FBI
attributed to the North Korean government. More recently, Russian attacks have been accused of
tempering with voting systems in the 2016 U.S. presidential election and with Ukrainian
businesses and governmental agencies.

1.2 Objective Of The Study

The objective is what the researcher wants to find out or investigate. In research we have
general and specific objectives.

1.2.1 General Objectives

This topic was chosen with main objective to examine the importance of network
security to organizations. The world is becoming more and more digitalized and also relies on
networks, so having a secured network system as an organization is already a step to a successful

1
business. Some of the following security majors could be used to secure an organization
networks.
Access Control: This refers to controlling which users have access to the network or especially
sensitive sections of the network. You can restrict network access only to recognized users and
devices or grant limited access to noncompliant devices or guest users.
Antivirus And Anti-Malware Software: Malware or malicious software is a common form of
cyber-attack that comes in many different shapes and sizes. Some variations work quickly to
delete files or corrupt data, while others lie dormant for a long period of time and quietly allow
hackers a back door into your system. The best anti-virus software will monitor network traffic
in real time for malware, scan activity log files for signs of suspicious behavior or long-term
patterns, and offer thread remediation capabilities.
Email Security: Email is an essentially important factor to consider when implementing
networking security tools. Numerous threat vectors, like scams, phishing, and suspicious links,
can be attached to or incorporated into emails. Because so many of these threats will often use
elements of personal information in order to appear more convincing, it is important to ensure an
organization’s employees undergo sufficient security awareness training to detect when an email
is suspicious. Email security software works to filter out coming threats and can also be
configured to prevent outgoing messages from sharing certain forms of data.
Firewalls: They are another common element of a network security model. They essentially
function as a gatekeeper between a network and the wider internet. Firewalls filter incoming and,
in some cases, outgoing traffic by comparing data packets against predefined rules and policies,
thereby preventing threat from accessing the network.
Those are some few of the many that exist.

1.2.2 Specific Objectives


 To investigate and study the tool used to bridge a company’s security online.
 To find out the best and most efficient security major to avoid unsecure networks.
 To evaluate the difference between a secured network and an unsecured network.

1.3 Definition Of Key Terms

2
Computer Network
This refers to the interconnection of computer devices so that they can exchange data and
share resources with each other. These networked devices use a system of rules, called
communication protocols, to transmit information over physical or wireless technologies.

Network Security
According to the SANS Institute, network security is the process of taking preventative
measures to protect the underlying networking infrastructure from unauthorized access, misuse,
malfunction, modification, destruction or improper disclosure. Implementing these measures
allows computers, users and programs to perform their permitted critical functions within a
secure environment.

Cyber Attacks
It is an attempt to gain unauthorized access to a computer, computing system or network
with the intent to cause damage. Cyber-attacks aim is to disable, disrupt, destroy or control
computer systems or to alter, block, delete, manipulate or steal the data held within these
systems.

3
CHAPTER TWO
PRESENTATION OF THE ORGANIZATION

2.1 Historical Background

2.1.1 Date And Content Of Creation

Fire Software is a company created in 2006 by a collective of four engineers, Fire


software (FS), a design office specializing in the provision of computer services, advocate the
computer revolution of the 21st century. Thus armed with the undeniable experience of its
engineers and consultants, it provides to its customers and partners with a wide variety of it
services much more specialize in the in the areas of professional training, IT maintenance,
Development of software, the development of graphic information system(GIS), Networking,
Sales of computers and accessories.

2.1.2 Geographical Location

Fire software is found in the center region of Cameroon that is Yaounde located precisely
at Marche central sharing a boundary with avenue Kennedy in the south and Hilton hotel at the
west.
2.1.3 Lay Out And Equipment

Layout
Fire software operates in a duplex, precisely the second floor which is made up of three
offices which are the manager, secretary and cashier and one general hall were the companies
activities takes place and a room or say a store where their goods are being sold.

Equipment
 The company is made up of seven computers all connected to a central point that is a
router using both wired and wireless medium with CAMTEL being their ISP.

4
 The company has an installed air conditional that provides a conducive atmosphere for
work to take places.
 The company also has network printer were documents and exams questions are usually
printed.
 IT also has a projector which is usually used by the boss during training classes.

2.1.4 Working Condition

The working condition of fire software is generally very good this because the company
is made up of equipment like air conditional, comfortable chairs and tables with a clean
environment which creates a favorable environment for working.
2.2 Organigram Of The Organization

MANAGER

ASSISTANT MANAGER

CASHIER SECRETAR NETWORKING MAINTENANCE GRAPHICS PROGRAMMING SALES PERSON


Y

CLEANER

5
2.3 Products And Services

Fire software is a company that carries out variety of activities such as


Networking
They setup networks for other companies using both wireless and wired network. They
also install software that enables them to monitor the performance of the networks example of
such software include Nagios which is been done with the help of a virtual machine.

Creation Of Applications And Websites


Fire software creates web site both professional and local for other companies or
businesses, who wish to advertise their products and services online.

Graphics Designing
The company produces posters for churches, musicians and business cards for
individuals.

Maintenance
The company is good in the maintenance of Pc and laptops, the author of the most good
works in the area as concern maintenance of brand new and second handed laptops of most
recent and renowned laptop mark and quality. With it qualified staff and technicians Fire
Software maintains all kind of laptops and PC by using the following services
 Computer Update
 Antivirus installation
 Memory
 Hard Drive capacity
 Video or Graphic card capacity

Repair
The repairs of IT equipment use by many offices in the region amongst all have in their
name Fire Software for its compliments of good work, accuracy and better organization. They

6
are equipped with most sophisticated tools for repairs and as such do repairs on the following
equipment:
 PC (CPU)
 Laptops
 Printers

Sales Of Computers And Accessories


Fire Software deals in the sales of all kinds of computers and laptops as it also deals in sales
computer spare or rather accessories. They sell brand new and fairly used computers and laptops and also
accessories
Laptop screens
RAM
Hard drives
Batteries
Keyboards
Mouse
Memory cards
External hard disk case
Laptop chargers
Power cables

Distribution
Distribution in Fire Software is done as per demand, command and purchase. Many
enterprises affiliated to Fire Software uses the wide knowledge of information Technology know
how of Fire Software to purchase computers and equipment out or around town.

2.4 Administration
The administration of FS is made up of the Manager, Assistant Manager and the workers/staffs.

Staff
The Fs company has around 12 personnel qualified in the following spatiality

7
 Development of GIS
 Website and application development
 Computer maintenance
 Establishment of cooperate network infrastructure
There are 2 personnel in the graphic design department, 4 in the website and application
development, 2 skilled personnel in the maintenance department, and four personnel in the
networking department.
There also include a manager, a secretary, a cashier and a sales person. Making the total
number of 16personnel in the company.

2.5 Objectives
FS objective is to establish a forum where IT problems could be understood and resolved,
also to better understand the need from the public and its newly produced IT equipment
demanded by numerous customers. FS is dedicated to better organization in IT support services.
Thus improving and impacting on the IT sensitization, with its goals of facilitating the usage of
IT products like laptops, PC and many other accessories with which the demand rises in our day
by day activities. FS will bring you closer ans closer to understanding usage, exploitatiom and
improving practical usage of IT products. It is based on these factors that the staffs of FS work
really hard to develop and develop new strategies to improving industrial benefits and as
companies also do improve their revenues, with FS gets better to serve and preserve its
customers.

8
CHAPTER THREE
INTERNSHIP ACTIVITIES

These are the various activities carried out by the intern during the period of the
internship.
3.1 Reports on activities
The following activities were carried out during my internship period.

Disassembly And Reassembly Of An HP 120 Desktop PC


This computer had a hard disk drive of 250GB, 4GB of RAM, 3.0GHZ of processing
speed. Before disassembling the PC we disconnected every cable connected to it proceeded with
the following:
 Remove the access panel: release the screws on the access pane, pull toward the rear and
remove it from the unit.
 Disconnect all cables from the unit
 Take off the power supply unit from the unit
 Remove the hard disk drive by removing the HDD cable and remove the drive.
 Remove the ODD (optical disk drive) by rotating the screw driver to release the ODD
and remove from the cage
 Take off the RAM from the RAM slots by releasing the sockets levers by pulling
outwards.
 Take off the system fan from the control unit by letting loose the screws
 Take off the CPU cooler by releasing the screws the remove the processor
 Take of the battery unit (CMOS)
 Then remove the mother board from the system
 And finally remove the PSU fan

In order to reassemble the computer again, we inserted back all the other parts saving the
RAM, HDD, ODD and finally the lead for the last.
It should be noted that when dismantling a computer all the screws should be kept carefully
to avoid any screw from getting lose.

9
Installing A Network Printer
In most cases what you have to do to setup a printer is to connect it to your PC. Simply
plug the USB cable from your printer to the available USB port on the PC and turn on the PC
and also turn on the printer. While connecting on a network, you need to know the name of the
printer. To connect an HP printer with series name of office jet pro 8720 to a network do the
following.
 Click the start button and open the control panel in the control panel menu, click on
hardware and sound
 Click on devices and printers
 Click add printer
 In the add printer menu that appears, choose the type of printer that is to be installed that
is either a local or a network printer and it will be a network printer.
 Choose the printer port and click next
 You then choose the printer manufacturer and the printer series model.
 In the printer sharing windows that appear choose to share the printer with others and
click next
 Click on print a test page and click finish.

Cable Preparation
We prepared a cable in order to connect a switch to a computer (straight through cable)
and another to connect computer to computers or switch to switch (cross over cable). We used
the following for the creation: CAT 5 cable, RJ-45 connectors, crimping tool and wire striper. To
create these cables we did the following:
 We started by stripping the cable ends at half inch so as to expose the inner wire.
 After stripping the cables, separate the wires so they can be arranged in order.
 The CAT 5 twisted paired cable consist of 4 pairs of twisted wire all colored with one
color and one stripped color. To create a straight through cable we the cables by placing
orange white, orange, green white, blue, blue white, green, brown white, brown on one
end the repeat the same combination on the other end of the cable which standard T568B
on both sides or green white, green, orange white, blue, blue white, orange, brown white,
brown on both sides of the cable which is standard T568A.

10
 For a cross over cable, we place the cables in the following order green white, green,
orange white, blue, blue white, orange, brown white, brown that is standard T568A on
one end and orange white, orange, green white, blue, blue white, green, brown white,
brown that is standard T568B on the end of the cable.

 After separating and paring the cables, insert the cables into the RJ-45 connectors
carefully and crimp using the crimping tool. Do this on both sides of the cable.

Sharing Of Files From Computer To Computer


We connected two computers and shared files between them. We did so using the cross
over cable we prepared. To do this we did the following:
 Plug in one end of the cross over cable into the Ethernet port of the first computer and the
other end into the Ethernet port of the second computer. The connectivity LED on both
network cards will be flashing green.

11
 Log into one of the computers, click start and type network and sharing center in the
search box and click on it when it appears. While there allow all access for file sharing to
other machines and save the settings.
 Go to the folder you want to share, right click and click properties, while there click on
share then advanced then enable to share the folder and allow access to the other
computer. Then do same to the other computer then share the files. Each computer will
then be able to access the file or folder shared by the other computer on their monitor.

Formatting And Reinstalling An Operating System


This is been done when the previous operating system fails that is scratches or becomes
slow. Computers require to be updated frequently too to ensure the function properly. Before
formatting, the drives were renamed and all important file in drive C was copied to drive D or
could be copied to any other drive because drive C is going to be formatted. We then prepare a
bootable flash drive with an application called Refus. If you are not having a bootable flash you
can purchase a DVD containing the operating system you wish to install. After getting all this
ready, we did the following:
 Plug in the laptop to power socket (optional but necessary for laptops with less resistance
battery)
 Insert the bootable flash into the USB port
 Restart the laptop
 On power on, immediately press F12 (for Dell), F9 (for HP, Toshiba). A boot menu will
then appear for you to choose from where to boot the computer you should choose USB
flash or the DVD drive if you used any.

12
 You will be prompted to press any key. So, press any key as you wish.

 Be patient, your setup will soon begin.

 Select US in the language fields.

 Click next and then click install now

13
 Select the operating system Bit that is x86(for 32 bit) or x64 (for 64 bit). It should be
noted that while choosing the bit you should take into consideration the RAM of the
computer, if the RAM is less than or equal to 2GB then you should go for x86 that is 32
bit and if it is more than 2GB then go for x64 that is 64 bit operating system.

 Now, accept Terms and Condition as you do for normal programs installation and click
next

14
 It is better to choose customize install than upgrade because you get option for formatting
the specific Drive

 Select drive C but if had renamed the drive select the drive name representing drive C

15
 Click drive option (advanced) and then format to format the select drive. After that click
next.
 Your installation will begin. You will have to wait until everything loads up.

 It takes about 20-30 min to complete installation. Wait until your computer restarts.

 Restarting is displayed on your screen.

16
 You will be prompt for computer name and click next after providing the name

 Now, select customize and fill all the required information and click “Next” when done.

 You are about to get installation finished when we’re getting your PC ready is displayed

17
 And you are done.

Setting Up A Network 0n Vista


Installing a wired network comprises assembling the proper components. To install a
wired network, assemble the cables, network adapter, and router, among other components.
Follow these steps to install the network
Turn off and unplug all the computers: All of them that was going to be connected to your
soon-to-be network was be unplugged.
Turn off all the computers’ peripherals: This includes printers, monitors, modems, and
anything else that’s attached to any computer were been turned off
The computers’ cases were been replaced and connect each network cable between the
computer’s adapter and the router (or switch).
Routing: Route cables under carpets or around doorways. (Most routers and switches have
power cords that need to be plugged into a wall outlet as well.
Plug the modem into the router’s WAN port if you are a broadband Internet user. You can plug
any PC into any of the numbered ports. (You can leave some numbered ports empty.)
Turn on the computers and their peripherals: Turn on the computers and their monitors, printers,
modems, and whatever else happens to be connected to them.
Select a location for your network. When Windows Vista wakes up and notices the newly
attached network equipment, it asks you for your network’s location: Home, Work, or Public

18
Location: Choose whether you’re working at home or work (safe) or in public (less safe), and
Vista automatically adds the proper security level to protect you.

Other activities include:


Activities With The Manager
The Manager of FS is very simple and understanding. He directs the various staffs of the
organization on how to carry out their duties and corrects the when the need arises. He is the one
who organizes meetings of the organization and makes it known to the staffs and other members.
He does not only carry out managerial functions in the organization but jobs of some of the staffs
such as computer repairs, formatting, network installation etc.

Activities With The Secretary


The secretary of FS takes every record of customers that come to the organization that is
the name and location of the clients and records it in the clients log book should in case the
information might come in handy, she takes the complaint of the clients and then direct to
department that suits their problem that either to the networking department, repair, graphics,
apps or web developing department or to the sales person. She also takes record of the workers
attendance that is the time they come and when they leave work.

Activities With The Sales Person


This is the person who sells at the store. She carries out activities like welcoming
customers, and making sure they are comfortable, asked them their reason for coming and if they
demand something available in stock she will sell and issue a receipt to the customer of which
the sum on the receipt will be paid by the customer to the cashier’s desks.

Activities With The Staffs


With the staffs, after the client have been seen by the secretary and direct to either
departments of the organization, the staffs of that department will make the customer feel
comfortable, take their complain again and see if they can handle it. If they can’t they will tell
the customer but if they can handle it the will tell the customer to come back afer some time or
day in the case where the complaint is critical.

19
Activities With The Cashier
The cashier of FS keeps record of all financial transactions carried out in the
organization.

3.2 Problems Or Difficulties Encountered During The Attachment


Here, the intern shall be explaining all the problems he/she encountered during the period
of the internship. During this period of internship, I encountered the following which were a
hinder to me:
 Lack of some working tools
 Distraction from the noise coming from the road traffic
 Though internet connection was provide it was sometimes really slow hindering us from
carry out research properly.
 Language barrier: In the company, most of the customers that come in are usually
French speaking so I usually face difficulties by either hearing their problem or
explaining to them problems I find out.
 Problem of monitoring network of fire software was another problem I encountered
this was because, I had no past knowledge on monitoring a network performance thus it
became challenging to me.
 Distance: The form my location to fire software was quite long which gave me a lot of
difficulties to be in the company early coupled with the morning traffic in the town.

20
CHAPTER FOUR
SITUATION ANALYSIS

4.1 Organizational strength and weaknesses


4.1.1 Strengths
It describes the internal factors that explain why the organization is surviving or growing.
At FS some factors that made them grow can be seen below:
Good Communication system
They used the downward communication method where all information passes through a
chain that is from the top to the lower authorities. This permits a fluent flow of information in the
organization thus preventing misunderstandings and confusions. And all this creates a friendly
and lovely environment for the workers.
Customer satisfaction
They always make sure that their customers are satisfied by all cost. They always make
sure that customers work in done perfectly and completed on time as promised. They create a
friendly relationship with the customers making the customer even more comfortable.
Modern equipment and computers
They use modern and effective tools for work, making the work done to be at its
standards. They use modern computer which are up to date making the flow of information more
rapid.
The devotedness of the manager
He devote all his time in organizing, controlling and supervising the activities of the
company he also goes ahead to partake in the lower level activities like computer repairs,
setting up networks.

4.1.2 Weaknesses
On the contrary, it explains why the company might not survive or is not surviving. Some
factors which lie as weaknesses include:
Noise
Since they are located beside the road, during working hours sometimes the noise from
the vehicles turns to distract the workers

21
Late coming
Workers of FS mostly come to very late sometimes keeping customers to wait for them
which is not good for them.
Difficulties in accessing the company’s location by new customers
The location of fire software is not easily accessible which usually makes it difficult for
new customers to locate it coupled with the fact that it is located on the second floor of a duplex.
4.2 Organizational opportunities and threats
These are the external things that are going on outside the company. You can advantage
of the opportunities and protect against threats, but you can’t change them.

4.2.1 Opportunities
These are external factors in your business environment that are likely to contribute to
your success.
Loyal customers
They have loyal and faithful customers who turn to refer more customers to the
organization due to their good work done
Large population
Due to the large population of the city (Yaounde), and the increase growth in the use of
electronics, it makes it easier for FS to sell out their product and services to the population.
Competition
FS faces little or no competition in the area since they offer the best services around the
place.

4.2.2 Threads
These are external factors you have no control over. You may want to consider putting in
place contingency plans for dealing with them if they occur.
Declining economic conditions
Since the country is experiencing some fall in the economic standards, FS is forced to
suffer from that as well
Increase in Taxes

22
Due to the increase in business taxes fire soft is also going through some pain in getting
everything done right.
Breach of data
FS has a weak and nearly unsecured network which could be accessed and hacked by
intruders or unknown competitors.

23
CHAPTER FIVE
SUMMARY OF FINDINGS AND RECOMMENDATION

5.1 Summary and conclusions


It was an internship carried out for a period of one month that is from the 3rd of August to
the 28th of August 2021. We went from Monday to Saturday. This internship really did help
broaden my skills in my departmental field and also in other aspects concerning occupation.
According to the work carried out on the field, and the data I collected I came to realize that
organizations without a network security or with low network security are so at risk so much that
it can lead to their downfall since very vital information can be taken from their network and
used against them by their competitors. Throughout my time at FS I learned a lot and it made me
a better person.
FS is a very good place to be and have specialized and skilled workers for all the
departments in their establishment and that’s something which is keeping them going and
growing. Would say they have got the really good computers and accessories at a lower cost.
They have the population of the center region covered as far as maintenance, networking,
graphic design is concerned. I am more than happy that I had the chance to be part of them and
that I could complete this internship working in such a prestigious institution. The supervisors
and the staffs all made me feel like I was a part of them. I did learn a lot during this period and
looking forward to apply this knowledge in school and in the society.

5.2 Benefits from the attachment


During this internship period I had to benefit from the following
 Installing operating system: while in class we were though t(theoretically) on how to
install an OS but during this period of internship, we did it practically.
 Formatting: We did lots of formatting during the attachment as we were thought in class.
 Cable preparation: More so, we also prepared cables used for LAN that is straight
through cables and cross over cables.
 File sharing: Also learnt how to share files
 Honesty: This is the ability of not being in fraudulent activities. FS staffs are truthful and
straight forwarded on how they do things

24
 Integrity: This refers to having a sense of moral understanding. FS staffs are well known
for their nice ways to talk and approach customers.
 Self-upgrading: I did seek out ways of upgrading my skills thanks to this attachment.
 Being positive: No matter how challenging work may be, I have learnt to always be
positive while hoping for change in future.
 Team work: during this internship I also learnt that team is really essential for
organizations growth.

5.3 Recommendation

I will like the recommend the following for the company FS and other companies out
there.
 The manager of FS should put in place a system which will help reduce late coming by
the workers. This could be in a form of sanctions or a reduction in salaries of the workers
who come late of absent work without valid reasons.
 Due to the location of FS they should put in place notice boards around town that will
help new customers locate them
 FS should also advertise their services and products through brochures and flyers and
also through radio station. This will increase the customers.
 They should endeavor to install and configure a good security system for their network.

25
REFERENCES

[1]. Chris LaBounty http//www.herzing.edu


[2]. Robert Roohpavar http//www.infoguardsecrity.com January 8 2021
[3] Black J.S, & Mendenhall, M.E, (1990). A review and theoretical framework for
future research. Academy of Management Review, 15, 113,136.
[4] 10th USENIX Security, August 2001, pp. 85-97
[5] Mumbai university >Computer Engineering> Sem 5> Structured and object
Oriented Analysis & Design Dec 2014, Dec 2015.

26
SATELLITE LOCATION OF FS

Fire software

27

You might also like