Free Essay

Computer Networks

In:

Submitted By anuragsharma2591
Words 2946
Pages 12
The Brand Experience Toolkit

Brand Experience Toolkit [August 2007]

Table of Contents

1.0 History of the AIESEC Brand
1.1 1.2 1.3 What is a brand? Why do we have a global brand? Brand Promise vs. Brand Experience: an evolution

2.0 The Brand Experience
2.1 2.2 2.3 2.4 2.5 2.6 2.7 An overview Our competitors Our target audiences Physical manifestations Benefits Differentiator Essence

3.0 Filter tool – how to use the Brand Experience in practice
3.1 3.2 Assessing your results Finding support

Brand Experience Toolkit

1.0 – History of the AIESEC brand
Brand Experience Toolkit [August 2007]

History of the AIESEC brand
The global AIESEC brand as we know it today was launched by AIESEC International in 2004. The first Brand Toolkit included explanations on what is a brand, why we need one and the steps in order to achieve that, including our Brand Promise, visual guidelines and marketing campaign.

1.1

What is a brand?

A brand is more than just a logo, slogan or a colour scheme; it is the image and reputation that we want others to associate with our organization. But, a brand is also more than just the image that we want others to have of us; it is also a description of the organization that we want to be. A brand is an expression of your actions and what you do every day. In AIESEC, our global brand is represented through our living The AIESEC Way. Our ―Brand Experience‖ is the experience we want our stakeholders (members, supporters and enablers) to live when they interact with AIESEC. The closer we can make this experience to the entirety of our Brand Experience the more we are strengthening our global brand every day.

1.2

Why do we have a global brand?

Having a global brand allows AIESEC (1) to be more consistent and credible, (2) to attract more stakeholders and give AIESEC a clear competitive advantage; (3) to attract the right stakeholders and to set the right expectations; and (4) to align the organization to globally leverage the AIESEC Experience.

Brand Experience Toolkit

1.0 – History of the AIESEC brand
Brand Experience Toolkit [August 2007]

1.3

Brand Promise vs. Brand Experience: an evolution

The Brand Promise introduced in 2004 was the start of the branding initiative from AIESEC International, bringing the network together to have one visual identity and synergizing messages across the network. While the earlier brand promise helped quite a bit to align the organization to be transmitting common messages, it was difficult to apply to products and also quite internally focused, not providing reasons for partners to engage with AIESEC rather than our competition. The brand promise was made up of words that we felt best described AIESEC, but there was no clear plan on how to use it in practice. Now a few years later, we see the need to evolve this further in order for it to be used in practice, including how it should be used in relation to product development and messaging—a crucial step on the path to creating a strong global brand for AIESEC. As a result, with the help of consultants from Unilever, we now have what we call the Brand Experience. This methodology will serve as a tool that can be used to filter everything we do quickly and easily to understand its alignment to our brand, which in the end supports in its strengthening. Unlike the brand promise which was internally focused, the Brand Experience first considers the outside environment and looks inward, reflecting how our stakeholders actually experience our brand when they interact with AIESEC, and how we do things differently than our competitors. By being conscious of this we can ensure that we are strengthening our global brand in all actions we take, meeting the needs of our stakeholders and putting us ahead of our competitors at the same time.

Brand Experience Toolkit

2.0 – The Brand Experience
Brand Experience Toolkit [August 2007]

The Brand Experience

Brand Experience Toolkit

2.1 – The Brand Experience: an overview
Brand Experience Toolkit [August 2007]

The Brand Experience: an overview
The Brand Experience is a simple way to understand how our target audiences (members, supporters and enablers) experience (or interact with) the AIESEC brand. The interactions and touch points they have with AIESEC will shape the impression of what AIESEC is to them, and by being conscious of this we can manage the kind of experience we would like our target audiences to have with AIESEC. The Brand Experience has several elements that will be discussed in more detail in this toolkit. They include:

      

Our competitors Target audiences Physical manifestations Benefits Our Values Discriminator Essence

(organizations offering similar products to our target audiences) (our potential members, enablers and supporters) (the first interaction point to AIESEC for our target audiences) (what our target audiences get out of engaging with AIESEC) (reflective of The AIESEC Way) (what distinguishes us from our competitors) (what we do in AIESEC, what we are about)

The next few pages of this toolkit will explain each section of the Brand Experience in more detail.

Brand Experience Toolkit

2.2 – Our Competitors
Brand Experience Toolkit [August 2007]

Our Competitors
Our competitors are other organizations that offer similar experiences to our target audiences as we do. They may be slightly or even very similar to us, based on what they offer. These include organizations offering:      Work abroad opportunities Volunteer abroad opportunities Cultural experiences Skills development Networks

Although there may be a few common competitors for AIESEC across this globe (ie) IAESTE for internships or JCI for volunteer opportunities, your direct competitors will differ from country to country, and perhaps even from city to city. It is important that you are aware of such similar organizations and the work they are doing so that you are able to identify how AIESEC differs from their activities and what we offer to our target audiences vs. what our competitors offer to them.

Brand Experience Toolkit

2.3 – Our target audiences
Brand Experience Toolkit [August 2007]

Our target audiences
As seen from our Balance Scorecard, our target audiences can be divided into three distinct groups of people:  Members

 Enablers (TN takers, mentors and learning/content partners), and  Supporters (financial and in-kind partners, Board of Advisors) The kinds of characteristics we would be looking for in potential members, enablers and supporters include: Characteristics for potential members:        Young people – recent graduates and students Youth interested in world issues Those who enjoy challenges Open minded active learners Those with an interest in leadership development Passionate and determined Those looking for learning and development opportunities

2.3 – Our target audiences

Brand Experience Toolkit

Brand Experience Toolkit [August 2007]

Characteristics for potential enablers:  TN takers o Companies expanding to other countries o Companies that needs and employees with specific characteristics o Companies with strong CSR or a willingness to start o Issues focused; market leaders Learning/content partners o Organizations working with issues relevant in society o Global organizations (with global reach) o Research-based organizations o Individuals with specific skills/knowledge/experience in a particular field Mentors o HR companies/specialists o University professors o Alumni o Industry specialists





Characteristics for potential supporters:  Sponsors, financial and in-kind o Organizations working on similar issues relevant in society o Companies/organizations that are working with youth o Organizations with the same end benefit Board of advisors o Industry specialists o Alumni o High profile people



2.4 – Physical manifestations

Brand Experience Toolkit

Brand Experience Toolkit [August 2007]

Physical manifestations
This layer includes all the external touch points (or interaction points) our target audiences have with AIESEC. Thus, their first interaction point with AIESEC will affect how they experience our brand. This layer includes things such as our marketing materials and visual branding guidelines (including our logo), but also extends to much more than this. The first interaction point that our target audiences have with AIESEC including everything from physical meetings to our website, conferences, even our Code of Ethics, all shape the way our target audiences will understand AIESEC.

Please note: the visual guidelines are currently being refreshed. The newest version is expected to be released in September 2007.

Brand Experience Toolkit

Brand Experience Toolkit [August 2007]

Benefits
Benefits are what our target audiences (or stakeholders) get out of engaging with AIESEC. While the benefits are the same for all target audience groups, the reasons why they are a benefit for each target audience differs based on the different ―experiences‖ that these audiences have with our brand.

These are the benefits that our target audiences experience when they interact with AIESEC.     Societal impact Personal and professional development International experience Global network

2.5 – Benefits

Although they are benefits for different reasons, the above four are benefits for all of our stakeholders, or target audiences. The chart below explains this in more detail.

Brand Experience Toolkit

Brand Experience Toolkit [August 2007]

Societal impact
Benefit for members  To have an impact on a certain issue  Learning opportunity  Providing the same experience to others Benefit for supporters  Knowledge sharing  Feeling of supporting to make an impact in society Benefit for enablers  Leadership development  Feeling of contributing to having an impact on society through others

Personal and professional development
Benefit for members  Self development (leadership development, self-discovery, skill building) Benefit for supporters  Supporting development of others  Feeling of supporting to make an impact on society Benefit for enablers  Access to top talent; having top talent in their organization  Feeling of supporting to make an impact on others

Brand Experience Toolkit

2.5 – Benefits
Brand Experience Toolkit [August 2007]

Global network
Benefit for members  Peers, alumni, businesses all over the world Benefit for supporters  Connect to youth around the world, other organizations Benefit for enablers  Alumni, youth around the world, other organizations

International experience
Benefit for members  Exchange opportunities, global learning environment, international conferences, etc. Benefit for supporters  Interaction with members who have international experience (open minded/worldly)  Branding and positioning  International conference involvement Benefit for enablers  Diversity in workforce  Branding and positioning  Interaction with members who have international experience (open minded/worldly)

Brand Experience Toolkit

Brand Experience Toolkit [August 2007]

Our Values
Our values are an important part of the Brand Experience. The organizational values defined in The AIESEC Way were not made to be written up on a wall and forgotten about. They dictate how we should act according to our value system for the organization. Our values are also what our target audiences experience and live when they interact with AIESEC, thus they definitely determine how others view us and experience our brand.

Our values

Imagine a TN taker hears all about the ambitious top talented youth that exist in AIESEC during his first interaction at a conference and decides to taken on an intern for himself. Imagine that intern meets all his expectations of being a bright, ambitious and passionate young person that makes a big difference in the company. The impression that TN taker will have of AIESEC will be quite good, because of the way he experienced our brand. Now imagine the same situation but in a negative way, this is not how we want our stakeholders to experience AIESEC. That is why values are so important and interlinked with our brand.

     

Demonstrating integrity Acting sustainably Activating leadership Enjoying participation Living diversity Striving for excellence

Brand Experience Toolkit

Brand Experience Toolkit [August 2007]

Differentiator
Youth driven impactful experience
Our differentiator is what makes us unique, or simply put, what sets us apart from the competition. This layer is very much linked with the next (the essence). While the essence may not be unique to our competitors, our differentiator is the unique point—how we do what we do differently than our competitors. Through the result of discussions held at the Global Brand Principles meeting held in May 2007, three concrete things that combined set AIESEC apart include:  Youth driven – the concept that AIESEC is run by youth for youth Integrated experience – the AIESEC experience comprised of leadership opportunities, an international exchange and a global learning environment Impact/activating positive leadership – making a positive impact on society

 

2.7 – Differentiator

To express these three differentiators in one sentence we have come up with the phrase: Youth driven impactful experience. Each part of this phrase has a strong meaning behind it.

Brand Experience Toolkit

Brand Experience Toolkit [August 2007]

Youth driven
This emphasizes energy, passion, emotion, and leadership or leading, essentially what AIESEC is about. It also reinforces the fact that we are youth run.

Impactful
This is about the kind of experience that our stakeholders have when they engage with AIESEC, and the positive impact it can have on them and/or on society.

Experience
The complete yet individual experience that our stakeholders have with AIESEC from a member’s AIESEC experience to a TN taker’s experience with an intern to a sponsor’s experience at a conference. This experience draws together all aspects of the AIESEC experience – leadership opportunities, international exchange and a global learning environment.

What the differentiator is not
This sentence is not meant to be used explicitly to explain AIESEC. The essence behind this statement is what matters. When you are explaining what sets AIESEC apart these are elements that should come up in your explanation, though the actual phrase ―youth driven impactful experience‖ is not meant to be a slogan.

Brand Experience Toolkit

2.8 – Essence
Brand Experience Toolkit [August 2007]

Essence
This is the essence of what we do as an organization. This may not be different to our competitors, but it is the centre of our actions. Our differentiator is how we do this differently to our competitors. Our essence is taken from the essence of the brand promise: activating leadership. AIESEC is about providing the platform and necessary tools for youth to develop themselves, so that they can have a positive impact on their environments. Through activating leadership we also want to communicate the important role the individual plays in the experience - the selfdriven element. We do this through the concept of AIESEC as a platform of opportunities from which individuals can drive their own experience. The essence of activating leadership can be captured in three simple elements:  


AIESEC is the platform - individuals drive their own experience We help individuals to both develop and discover their potential Our ambition is to develop people that will have a positive impact on society

Brand Experience Toolkit

3.0 – The filter tool
Brand Experience Toolkit [August 2007]

The Filter tool – how to use the Brand Experience in practice
In order to use the Brand Experience in practice, a filter tool has been created which is a simple set of questions that you can apply to any product or message to check if it is aligned to the Brand Experience or not. If it is not, using this tool will also help to indicate what areas need to be improved in order for your product/messaging to be strengthening our brand. To use this tool, you will need to have your product in question with you. Go through the series of questions below and answer them using a ―traffic light‖ system: green if the answer if completely true, red if it is completely untrue and yellow if it is somewhere in the middle. The Filter tool questions:

Question
1. Is it true to the essence (activating leadership)? 2. Is it true to our differentiator (youth driven impactful experience) and thus different to those offered by our competitors? 3. Is it consistent with or not contradicting any of our values? 4. Is it reflecting the integrated development experience in The AIESEC Way (exchange, leadership, global learning environment) and our current organizational strategy? 5. Is it reflecting at least two primary benefits? 6. Is it adhering to the visual guidelines?

Green

Yellow

Red

Brand Experience Toolkit

3.1 – Assessing your results
Brand Experience Toolkit [August 2007]

3.1

Assessing your results

After going through the filter tool above with a product, idea for a product or general messaging you should have a grid of green/yellow and/or red that will give you an indication of how closely your assessment reflects the Brand Experience. For products with many green’s, this is a very good representation of the Brand Experience and will help to strengthen our global brand. For products with many yellows, this should be an indicator that some parts of the product need to be worked on a bit more in order to better reflect the whole of our Brand Experience and contribute to strengthening our brand. Use the Brand Experience filter tool to help you identify what areas exactly need a bit of work in order to be more reflective of our ideal Brand Experience, and strive for this. For products with many red’s, first consider how much this product is reflecting our Brand Experience. If it is not, then it is not the ideal way we would want our target audiences to interact with AIESEC. In this case, consider the need of this product in your LC or MC and work out a plan to ensure the product will be redefined in the future, towards our Brand Experience, or consider phasing out the product altogether, by finding other more aligned products to help meet the financial resources brought in by your nonaligned product.

3.2

Finding support

The Global Communication Crew can help you to use this tool to help strengthen our brand. Check out the Global Branding Community on www.aiesec.net for more information.

Brand Experience Toolkit

Similar Documents

Premium Essay

Computer Networks

...North South University  School of Business MIS 105 Introduction to the Computer  Group Presentation   Summer 2012  Presentation Date:  05‐Aug‐2012 Sunday    Venue: Classroom         Time: Normal Class time       Out of: 30    Topic: Computer networks    Scenario: You work in the mid‐level management position of a large multinational  corporation handling millions of records per month. The corporation has about 10  different concerns with around 50 branches countrywide. The corporation has recently  decided to overhaul their computer network system in order to tune up their data  communication system. You, as in charge of the project, are to design a new networking  plan that will improve the performance of their existing data communication system.    What to do:  • Prepare a Multimedia presentation (Power Point) in your group that clearly  explains your plan. If you are planning to use any software/hardware you must  be very specific with their names and the way they work along with their success  history. You are required to perform an extensive online research for this  purpose. You may assume any other parameter that has not been mentioned in  the above scenario.  • You must reference every page (in‐text referencing) of your presentation in  Harvard style. Remember, your work do not have any value without appropriate  referencing. Your presentation must include at least 6 in‐text references; at least  2 of these must be from online or printed journals. You may download Harvard ...

Words: 531 - Pages: 3

Free Essay

Computer Network

...I. Computer Dynamics Computer Dynamics is a microcomputer software development company that has a 300-computer network. The company is located in three adjacent five-story buildings in an office park, with about 100 computers in each building. The current network is a poorly designed mix of Ethernet and token ring (Ethernet in two buildings and token ring in the other). The networks in all three buildings are heavily overloaded, and the company anticipates significant growth in network traffic. There is currently no network connection among the buildings, but this is one objective in building the new network. Describe the network you would recommend and how it would be configured with the goal of building a new network that will support the company’s needs for the next 3 years with few additional investments. Be sure to include the devices and type of network circuits you would use. You will need to make some assumptions, so be sure to document your assumptions and explain why you have designed the network in this way. Because we are considering the company present needs and over the next 3 years and not adding any addition investments, I would design the network using the traditional network design process. Computer Dynamics is centrally located in three adjacent five-story buildings, however there is no network connectivity amongst the buildings, which means we have to build a backbone to connect all three LANs. Before addressing the connectivity issues amongst the buildings...

Words: 460 - Pages: 2

Premium Essay

Computer Network

...Week 2 – Case Study SEC-280 11-9-2013 The first point that I will address consist on the multiple dangers that computer networks are exposed, that are in majority done by perpetrators that get access to servers of Windows and Linux to explode their vulnerabilities.. The use of these codes or malware in the form of viruses, worms, time bombs or any peculiar name this individuals use to give to their destructive toys, are a major concern to the protection of confidential information. Data so sensitive that in their majority is composing of identity, credit, and property information so well collected and compiler that is plenty for the creation of a clone of a company or a person. These identity theft atrocities are not limit to the software and information appropriation; also the attacks diminish computer performance, affecting their velocity and cause computers to crash. The CIO should possess a compendium of way’s to defend his network, and a rapid decision capability to take decisions in a short time period. Furthermore, in general terms security; as we can define “ the act of provide a sense or protection against lost, attack or harm”, can use or integrate a complete protection plan. Depending on the resources of the company the integration of a security plan that can integrate “the five pillars of security IT security operation: policy and audit management, access management, infrastructure and hardware security and incident response.” The real world presents to us a...

Words: 591 - Pages: 3

Premium Essay

Computer Networks

...| Computer Networks | By:Yaafiz Mohamed (S12425216)Zimna Ahmed (S12465436)Shahuma Abdulla (S12465351)Najudha Adam (S12465351)Sama Ali (S12465333) | | | | | Table of Contents Introduction 3 Computer and Networking. 3 Characteristics of Computer Networks. 3 Types of Computer Networks. 4  PAN (Personal Area Network) 4  LAN (Local Area Network) 5  MAN (Metropolitan Area Network) 5  WAN (Wide Area Network) 5  CAN (Campus Area Network) 5  SAN (Storage Area Network) 5 Why do we network our computers? 6 Peer-to-peer networking. 6 Computer Network Technologies 7 Conclusion: 8 Reference: 9 Introduction The purpose of the report is to survey and monitor the current state of computer network and the types of computer networks. This report is written by examining a range of recent published articles, magazine articles, and internet sites on the topic of computer networks used which are used commonly. The report is mainly about the types of computer network and their functions. Computer and Networking. A computer is a programmable machine, which is designed to sequentially and arithmetically carry out a sequence of logical operations. The particular sequence of operation allowing to solve more than one kind of problem. It responds to a specific set of instructions in a well defined manner. It can execute a pre-recorded list of instructions. Main components of computers are input, output and process. (Thakur) According to (Mitchell, What is (Wireless...

Words: 1669 - Pages: 7

Premium Essay

Computer Network

...Computer Network A computer network is a group of computers that are interconnected by electronic circuits or wireless transmissions of various designs and technologies for the purpose of exchanging data or communicating information between them or their users. Networks may be classified according to a wide variety of characteristics. This article provides a general overview of types and categories and also presents the basic components of a network. Introduction A computer network allows sharing of resources and information among devices connected to the network. The Advanced Research Projects Agency (ARPA) funded the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defense. It was the first operational computer network in the world.[1] Development of the network began in 1969, based on designs developed during the 1960s. For a history see ARPANET, the first network. Purpose Facilitating communications Using a network, people can communicate efficiently and easily via e-mail, instant messaging, chat rooms, telephony, video telephone calls, and videoconferencing. Sharing hardware In a networked environment, each computer on a network can access and use hardware on the network. Suppose several personal computers on a network each require the use of a laser printer. If the personal computers and a laser are connected to a network, the personal computers users each can access the laser printer on the network, as they need...

Words: 3658 - Pages: 15

Free Essay

Computer Network Lab Manual

...Hubballi COMPUTER NETWORKING LAB Mahantesh Patil 2BV14IS410 Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET LAB-01 List the hardware components 1) Difference between switch and Hub: 2) Difference between SWITCH and ROUTER 3) Differences between Router and Gateway 4) What is the Difference between Subnetting and Supernetting? HARDWARE COMPONENTS Cables: 1|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET Cables: which are used to connect one or more devices to computer or network. Different types of network cables are available market they are Coaxial cable, Optical fiber cable, Twisted pair cable. RJ-45 The most common UTP connector is RJ45 (RJ stands for registered Jack), as shown in Figure. The RJ45 is a keyed connector, meaning the connector, meaning the connector can be inserted in only one way. 2|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET SWITCHES: Switches contain many ports to connect different network segments. They are similar to hubs, but offer greater performance. When a network contains a large number of devices, switches are needed instead of hubs to make sure the communications between devices does not slow down. Contrary to hubs, switches send the data it receives only to specific ports. NIC(NETWORK INTERFACE CARD) A network card, network adapter, or NIC is a piece of computer hardware designed to allow computers to communicate...

Words: 3647 - Pages: 15

Premium Essay

Computer Networks

...computer networks Table of Contents DECLARATION 2 INTRODUCTION 5 PURPOSE 5 NETWORK CRITERIA 6 Performance 6 Reliability 6 Security 6 TYPES OF NETWORK CONNECTION 6 NETWORK CLASSIFICATION 7 Connection method 7 Wired technologies 7 Wireless technologies 8 Scale 9 Personal Area Network 9 Local Area Network 9 Metropolitan Area Networks 10 Wide Area Network 10 Network Architecture 10 BASIC HARDWARE COMPONENTS 14 Network interface cards 14 Repeaters 14 Hubs 14 Bridges 15 Switches 15 Routers 15 Modem 16 CABLE STANDARD 16 Connectors and other information 16 Conductors required 17 Characteristics 17 ACCESS CONTROL METHODS 19 Token Based Access 19 Token priority 19 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) 20 Collision detected procedure 20 INTRODUCTION A computer network, often simply referred to as a network, is a group of computers and devices interconnected by communications channels that facilitate communications among users and allows users to share resources. Networks may be classified according to a wide variety of characteristics. A computer network allows sharing of resources and information among interconnected devices. In the 1960s, the Advanced Research Projects Agency (ARPA) started funding the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defense. It was the first computer network in the World.  Development of the network...

Words: 5343 - Pages: 22

Premium Essay

Unit 7 Computer Networks

...CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 AIM OF THE UNIT This unit aims to give the learners an understanding of the key components, the network protocols and the services provided by network systems. Learners will develop skills required to ensure network security, gain an understanding to the functions of hardware and software components, the purpose, connections and connection devices and why network security is important. Networks are used not only in large organisations but in small businesses and homes. Learners will understand the types of network and the principles across LAN and WANs. They will understand the options for wired and wireless networks and the and appreciate the benefits and risks to businesses of a network. www.ocr.org.uk 2 Computer Networks Level 3 Unit 7 ASSESSMENT AND GRADING CRITERIA Learning Outcome (LO) Pass The assessment criteria are the pass requirements for this unit. Merit To achieve a merit the evidence must show that, in addition to the pass criteria, the learner is able to: Distinction To achieve a distinction the evidence must show that, in addition to the pass and merit criteria, the learner is able to: The learner will: 1 Know types of network systems and protocols The learner can: P1 describe the types of networks available and how they relate to particular network standards and protocols...

Words: 1844 - Pages: 8

Premium Essay

Threats to Computer Networks

...TABLE OF CONTENT Introduction 2 Threats 2 • State-sponsored espionage and sabotage of computer networks 2 • Monster DDoS attacks 2 • The loss of visibility and control created by IT consumerization and the cloud 2 • The password debacle 3 • The insider threat 3 UAE CASE 3 Precaution 4 Conclusion 4 Bibliography 5   Introduction As the requirement of the paper I will explain the types of fraud may face by the organisation computer networks. Along with I will discuss two cases of such fraud in UAE and finally I will discuss possible precautions to mitigate the risk of such frauds. In recent year the computer network threats become technically more advanced, sophisticated, more organised and at the same time difficult to detect. It is important to mention that these attacks not only damage network security for financial frauds but this also aim to disable and reliability of the infrastructure as well, which may cause worse type of threat to the national security. (Tom Cross and Eric Savitz, Forbes Staff, 2012) Threats Most respected financial magazine FORBES has mentioned five main security threats to the computer networks which includes. • State-sponsored espionage and sabotage of computer networks o In 2012 a very famous virus called Flame was discovered which was not traced by the software in years. Similarly virus named Shamon destroyed the data of oil and energy companies and made the machines unbootable. • Monster DDoS attacks o DDos stands for the...

Words: 1014 - Pages: 5

Premium Essay

Threats and Attacks to Computer Network

...Chapter 4 Threats and Attacks to a Computer Network Research shows that “threats to the computers and networks have been an issue since computers began to be used widely by the general public. Nowadays, any computer or network that is connected to the Internet is at risk” (http://infopeople.org/resources/security/basics/threats_vulnerabilities.html, 2008) There are unlimited different types of threats exists in computer networking field but in this report mainly six different common but important threats were discussed. 4. 1 Spoofing Spoofing is a technique used to hide identity of traffic originator or assume identity of trusted entity or fooling a computer into believing which actually you are not. The most common spoof is email where a hacker pretend to be a different internet address from the one you have just to gain his/her credit card no, passwords, personal information or to theft any identity. Spoofing normally involves sending many packets/messages pretending to be a real legitimate person and spoofed IPs are very hard to back track. There are many different types of spoofing, such as ▪ IP addresses, MAC addresses changing attacks ▪ Link alteration ▪ DNS server spoofing attack ▪ Content theft ▪ E-mail address changing attack 4.2 How Penetration Attack Works? Penetration attack is basically to an attempt to break the security features of a system in order to understand the system or system design and implementation. The main purpose of penetration...

Words: 934 - Pages: 4

Premium Essay

The Role of Computer Networks in Smb Operations

...micro-employing less than 6 people, medium-employing 6-9 people and small businesses-between 10 and 29 employees. In terms of activities they are mostly engaged in retailing, trading or manufacturing and education. In Ghana SMBs have been noted as the engine of growth by the National board for small scale industries through the provision of employment and income. They represent about 92% of Ghanaian business and contribute about 70% to Ghana’s GDP and over 80% to employment (Ghana statistical service 1998). Information is needed and distributed every day in businesses. Every business start with high hopes of success but with inaccurate data and the wrong means of transferring this information may lead to the sudden collapse of the business. Computer network is one tool owners of businesses can utilize to gain access to accurate information and transfer those information generated at rapid speed. Data generation, dissemination and storage are at the...

Words: 10202 - Pages: 41

Premium Essay

Computer and Network Security

...Windows NT (CVE, 2013). In the first article it discusses the use of USB devices in the workplace. USB’s are used for transporting data from one computer to another. These allow for business requirements to be reached at a faster pace but they also pose a number of security challenges. Those challenges may be “disgruntled workers, careless users and malicious individuals” (Couture, 2009, p. 6). Ways to migrate this issue is by gluing shut the ports, disable USB ports in BIOS, prevent users from installing a USB device by denying permission on files called usbstor.pnf and usbstor.inf, making USB ports read only, disable USB ports in Group Policy, or disable Autorun (Couture, 2009, p. 11). In the second article it discusses the vulnerabilities of the BIOS. The BIOS performs power up test amongst the hardware components and memory and without this program the computer wouldn’t know what to do after it was turned on. The BIOS can be accessed by the use of backdoor passwords, cracking the BIOS password, deleting the contents of the CMOS RAM by software and/or hardware (Allgeuer, 2001, p. 4). Ways to mitigate the risk of users accessing the BIOS is to use BIOS passwords to protect the BIOA configuration utility, for the more critical systems different BIOS password should be used than less critical systems, boot only from hard drives, computer cases should be...

Words: 1760 - Pages: 8

Premium Essay

Computer and Network Security

...Computer and Network security Problem statement Unauthorized Access “As the threat of unauthorized access grows companies and people continue to look for security to upgrade.” (Howard, 2009)``Unauthorized access'' is a very high-level term that can refer to a number of different sorts of attacks. The goal of these attacks is to access some resource that your machine should not provide the attacker. For example, a host might be a web server, and should provide anyone with requested web pages. However, that host should not provide command shell access without being sure that the person making such a request is someone who should get it, such as a local administrator. What network security is The history of network security “Sense the 1980’s networks have become more complex, so the need for security has become more complex.” (Mowers, 2006) The need for network security is a relatively new requirement. Prior to the 1980s most computers were not networked. It was not due to lack of desire to network them; it was more a result of the lack of technology. People or organizations could be interconnected over the shared network. It was no longer necessary to connect systems in a point-to-point configuration. Vulnerabilities were introduced with the deployment of this distributed environment utilizing shared, packet switched networks employing protocols such as TCP/IP and the concept of trusted systems. Systems on the network "trusted" each other. This situation was frequently...

Words: 1474 - Pages: 6

Premium Essay

Computer Network & Information Security

...has focused on computer security of big businesses and how they have been breached, yet individuals do not stop and think about their own personal computer safety. Information can be stolen or damaged, access of personal computers can be gained without permission, viruses and worms can enter creating problems for a user, and our computers may be susceptible to cyber-attacks from hackers. Yet most computer users are new to the technology or do not realize the dangers at hand. This is why users need to learn how to keep their personal computer safe. To achieve a good level of security, there are many important elements that must be taken into account: authentication, access control, data integrity, content protection, etc. Information security can be obtained using methods such as cryptography and network protocols. Computer security is the process of detecting unauthorized use of your computer or PC. As the old saying goes “prevention is better than cure”, according to this we realize that if we learn about the possible loopholes in the security, then we can prevent it from occurring in the first place. But the big question is 'why should I care about my computer security?’. We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Although we may not consider our communication a 'top secret', but you don’t want others to eavesdrop on you conversations, read your mails, use your computer to attack others...

Words: 1454 - Pages: 6

Free Essay

Evaluating the Security of Computer Networks

...Evaluating the Security of Computer Networks Security in Systems Architecture and Applications SE579 2 Table of Contents Evaluating the Security of Computer Networks I. Vulnerabilities A. Design Flaws B. Poor Security Management C. Incorrect Implementation II. Firewalls A. Packet Filtering B. Circuit Level Gateway Proxy Server C. Application Gateway III. Antivirus A. Scans IV. Intrusion Detection Systems V. Disadvantages VI. Conclusion 3 One of the major computing challenges in today’s economy is the lack of adequate security over the information computer networks, and internet applications in which business, government, and economy depend on. Businesses have become more dependent on information. The gathering, organizing, managing, finding, and analyzing of information are crucial to businesses. Computer viruses created by hackers cost businesses $55 billion in 2003. In 2011, a single instance of hacking on the Play Station cost Sony more than $170 million, while Google lost $500,000 due to hacking in 2005.(Coyne) 2003 Single instances of hacking may cost as much as $600,000 to $7m a day for...

Words: 2281 - Pages: 10