Essays.club - Get Free Essays and Term Papers
Search

It540: Secure Computer Network

Autor:   •  October 29, 2017  •  1,401 Words (6 Pages)  •  657 Views

Page 1 of 6

...

POSSIBLE VULNERABILITIES

WHAT TO CONSIDER

Use of Weak Passwords

Use strong passwords; simple password such as a dogs name or word out of the dictionary can compromise an organization

Need for control of Critical Data

Need for a list of mission critical data such as critical database, financial, staff documents, and customer data. Need to know how this data is backup, stored and accessibility.

Secure your Servers

Secure devices that connect to the Internet directly. Email or Web servers or a public network exposed to the Internet are vulnerable. Software tools are available for hardening your network.

Regularly backing up Critical Data.

Backup Critical data regularly needed in case of a security breach.

Understand the risks of social engineering

A leading cause of security breaches is the ability for hackers to trick individuals into divulging secure and private information.

Take Basic Security Precautions

Software patches, virus updates, and operating systems, automation of these update can help prevent issues.

Test Backups

Administrators must test backups, Restoring only to find the backups are no good can have immeasurable consequences.

Access to the network by vendors

Use Network equipment (firewall, routers, switches) to create a sub-network for vendor and staff computing. Use of virtual networks and firewalls can accomplish this and if a wireless network is used by vendors their laptops and can have malware and viruses.

("Where and How to Find Vulnerabilities," n.d.)

Q5. Included details how to protect network resources from unauthorized access and other potential security breaches.

Organizations are vulnerable to unauthorized access and other security breaches. Networks need to be secured against various types of attacks such as viruses, worms, malware, adware or spyware. Even a common type of network attack such as Denial of Service (DoS) where a network is flooded with requests limiting or preventing access to the Internet.

Businesses must formulate a strategy to prevent against the security breaches. A consultation with a telecommunications to determine what solutions are available for network security. Companies can set up a firewall, gateway anti-virus, and anti-spyware protection and to help control and report on outgoing and incoming communications traffic (Hampshire, July 1, 2011).

An Intrusion Detection System (IDS) provide an additional effective level of security by aiding in detecting attempts by attackers to compromise applications, data or information systems. A web server should be available to system administrators for updates/patches on the network to keep systems operating at the highest level. Usage of any of the tools mention needs to be up-to-date to so they are effective within an organization. Organizations need to have a solid, effective security plan. Part of this plan can be to have monitoring tools that control which websites employees visit. Management reporting tools help eliminate time spent surfing the Internet or using personal email and social media sites. Monitoring helps with productivity and workflow to help businesses accomplish goals. Network security needs to be done 24/7/365 days a week with the tools mentioned and with buy-in from Management. No one piece of software or a tool can provide complete network security so with an effective security plan in place, and multi-level security can help prevent security breaches. These are some of the tools more defined tools may have to be used to identify the compromise (Yakabovicz, n.d.).

---------------------------------------------------------------

References

Delaney, D. (2011). Who’s doing what on my network? Retrieved from http://www.computerworld.com/article/2471374/infrastructure-management/who-s-doing-what-on-my-network-.html

Hampshire, K. (July 1, 2011). How to prevent security breaches with network security solutions. Retrieved from http://www.sbnonline.com/article/how-to-prevent-security-breaches-with-network-security-solutions/

Identifying Vulnerabilities and Risks on Your Network. (n.d.). Retrieved from http://techsoupforlibraries.org/cookbook-3/networking-and-security/tools/where-and-how-to-find-vulnerabilities

Investigating Compromised Servers. ( Dec 21, 2012). Retrieved from https://community.rackspace.com/general/f/34/t/75

Live Forensic Toolkit. (n.d.). Retrieved from http://masterkeylinux.com/index.php/home

TRIPWIRE FILE INTEGRITY MONITORING. (n.d.). Retrieved from http://www.tripwire.com/it-security-software/scm/file-integrity-monitoring/

VirusTotal . (n.d.). Retrieved from https://www.virustotal.com/

Yakabovicz, E. P. (n.d.). IDS and IPS: Information security technology working together. Retrieved from http://searchsecurity.techtarget.com/tip/IDS-and-IPS-Information-security-technology-working-together

...

Download:   txt (9.7 Kb)   pdf (84.9 Kb)   docx (13.8 Kb)  
Continue for 5 more pages »
Only available on Essays.club