Free Essay

Implementing Network Security

In:

Submitted By devanhindman
Words 2592
Pages 11
Implementing Network Security
Your Name here
ISSC361: Final
American Military University

Implementing Network Security Network design teams have several aspects that need to be considered when presented with the task of building a network for an organization. These things range from how many devices to put on the network, what kinds of devices, location of devices, and even how the cable will be connected to the devices. The one item that should always be at the forefront of every network design team, is how the network will be secured. This security should be very in depth and go into more than just technical aspects of security, it should also cover physical security of the network such as the building and sensitive rooms. Organizations are only as successful as the information they have, they will want all sensitive or proprietary information protected to the utmost. In order for most network teams to accomplish this, they themselves need to attempt to break into or hack the network in order to identify the weakest points and secure them properly. Essentially, you can build a great and fast network but if you can’t protect it then it will provide no usability to the client and this is why network security should be a priority at all times of the process. As stated above, the security implementations and considerations must be vast and include all aspects of the network. The first thing to take into consideration is the physical security of the area the network will be located. In order to accomplish this specific task, it is important to take into account who will be allowed to have access to the location, who shouldn’t be allowed in, and what measures will be taken to protect against this. With all of the physical security technology available, you can implement security measures for access with devices such as fingerprint scanners, eye scanners, pin pads, and card access readers. These specific devices will provide authentication factors for access to the building that houses the network and help ensure that only authorized personnel enter the premises. It is also important to remember that physical security will now reach beyond the limits of the main building itself as many organizations utilize many different mobile devices for on the go network access. With portable devices it is vital that users maintain physical control of them while traveling or even place a tracker on the devices in case of theft or loss (Shinder, 2007). Where many organizations fail with physical security is by not incorporating at least a two factor authentication to gain access to sensitive areas or devices. When they use only username and password, that only provides a one factor authentication with something you know. If you use a Common Access Card along with a pin or password, you can now have two factor authentication with something you have and something you know. Something that can get organizations into trouble with unauthorized access is when guests are coming into the area. While you may know the guest, you may not really know what their true intentions might be and therefore should treat the situation very seriously. One way to accomplish this particular task is by having them fill out their information and agree to specific terms of their temporary access. They should always be accompanied with an authorized employee in order to ensure they don’t have access to something they shouldn’t which is why they will wear an access badge that says “escort required”. It is also important to segregate private and public network resources so a threat can’t get access to one through the other. An example of this is to have a separate wireless network for guest access so sensitive information can’t be seen or taken. Another important and effective technology that should be implemented in the network design is use of network intrusion tools. These types of tools can be used to actually test the strength of the network and how easy or difficult it is to gain access to the network or the building. Using items such as penetration testers will give a network administrator a good understanding of where the biggest vulnerabilities might be in the network. You can even go as far as sending in teams of people to try to gain access to specific areas of a building in order to see how difficult it is or if policies need to be changed or updated. Another aspect of this particular security measure would be to install a server that is only used to test things. This provides the network administrator a segregated area of the network to try to implement new technology and have no actually effect on the real network. This is important because if a new patch or security setting is corrupt and it is implemented to the actual network, you are putting the entire network and system at risk as opposed to conducting the update in a test environment first. Once the physical security aspect is well covered and decided on, you then need to look at the daunting task of choosing what security measures will be used on the network itself. With threats that are constantly growing and adapting to current security measures, the actual security of the network is a non stop task that should pro active and not reactive. The time to implement the correct security measure isn’t after the attack but before it and this isn’t always an easy task to accomplish. Something that should be included in this particular area isn’t always thought of but having users read and sign an Acceptable Use Policy is vital. This provides users with the information needed to understand what is or isn’t allowed on a network and provides them a forum to ask administrators any questions that they may have regarding network access. It also helps hold individuals responsible for any actions taken on the network that was covered and they should sign these on at least an annual basis or when any major changes occur. One technology that can be used for this is a web site blocker which ensures users can’t access sites that may cause harm to the network and are controlled by the administrator. You will also need to implement a firewall that provides a specific level of security but isn’t so robust that it just blocks everything and causes issues to completing work for employees on a day to day basis. One item on a network that will occur hundreds if not thousands of times daily is the sending and receiving of E-mails. This is normally the lifeblood of information and data sharing and needs to be taken highly into consideration from a security aspect (Manky, 2010). There a few ways to ensure this occurs, such as using digital signatures and encryption. The digital signature on the mail will tell the receiver that the information is valid and from a trusted source. The encryption and decryption will let them know that the information is unchanged and still has integrity. An organization is only as good as the information it has and can provide, ensuring this information is unaltered and from a legitimate source provides the correct level of security. It is also important that users understand they should be cautious when opening messages or attachments from an unknown source. This is how many attackers get access to a network, they will gain access once the attachment is downloaded and take over the system and inherently gain access to all network resources with the user being unaware what happened. These are all things that can affect the network from outside the firewall, there are also technology implementations to protect from insider threats as well (Savitz, 2012). One of the things to be implemented is a technology that blocks USB ports from being used unless prior authorization is given. USB use is a very common way attacks end up getting into the network from inside the firewall (Manky, 2010). You can run software on a system that only allows the use of external devices to include CDs if the system administrator has given authorization and scanned the device prior to the use. As stated previously, security threats are always changing and adapting to current security practices. This means administrators need to stay updated on all future trends with technology to protect against attacks as well as knowledgeable on the attacks themselves. Cloud services are growing at a rapid rate in many different organizations, this presents a different kind of threat to consider for the network. Hackers have been slowly attacking clouds more and more by stealing data and in order to protect against these threats it is important to have good password policies as well as a limit on who can access the cloud services (SophosLabs, 2014). Another future trend is mobile security on all devices being taken outside the main building. With more and more organizations requiring mobile use while travelling, hackers have access to them on the wireless unsecured networks they are utilizing. In order to help protect against this threat, users should be issued the mobile device with specific security measures in place such as not allowing them to download applications that aren’t on the device when they receive it from the company. With employees having social media and a lot of information on the open source internet, social engineering will only grow in the future as a major threat to organizations. If a hacker can exploit an employee based on weaknesses found through social media sites, they can get them to access the network from the inside with authorized credentials making it very difficult for administrators to catch them before damage is done. This is where the acceptable use policies and keeping employees informed on proper online etiquette is vital to the success of the overall organization security plan. At the end of the day, it is going to be very difficult if not impossible to be completely protected from every possible attack that could occur on the network. This would be very costly and would more than likely render the network useless when implementing every single security practice at once. This is important because the system and network administrators will need to stay educated on what attacks are occurring on similar networks and protect themselves against them. Staying updated and educated on all technology that can protect against attacks and the attacks themselves will ensure the best possible situation for the organization’s network security platform. With Information Technology growing at a rapid rate and covering a vast array of areas in the business world, it is important to understand the different types of regulatory issues that could be posed. Most of the regulations involve information sharing and what is allowed to be shared or with whom. One type of organization that has this in vast quantities is the healthcare industry. In particular, with healthcare provides and technology, they must ensure that they completely comply with the Health Insurance Portability and Accountability Act (HIPPA), which ensures the privacy of sensitive patient information. This is important to the network design team and administrators because they need to ensure any servers that are being used to store this specific data are using the utmost security measures to ensure the hospital is remaining in compliance with this law. Expectation is really the most common theme for data on a network. Most companies will be required to treat personal information delicately in order to ensure customer and employee privacy. Another aspect of this subject is protecting employee information such as pay rates. This is important to keep secure as how much each employee is making should be known to that employee, the hiring manager, human resources, and the owner. Ensuring this type of data is secure is a big issue put on the lap of the network administrator. As the network administrator, you should also have employees sign a document that tells them what information will be stored on the network or servers so that they are informed in case of any information or data loss. This prevents employees from coming back and saying they weren’t aware this information was being stored and they feel as though their privacy has been violated by the company. With the dependency on the internet and connectivity only growing larger as the years go on, there are a vast number of companies involved in this specific area. The ability to create hardware and software has become so widespread there are too many companies to list them all. One of the main companies that will be utilized in most organizations will be Microsoft. This company will likely provide the system operating system and provide network administrators with updates and security patches to implement directly from the company. This ensures that all systems have the latest security patches on them and are protected from common attacks on that specific operating system. With different companies being the front runner in their specific field you can end up having companies ranging from Microsoft, Apple, Cisco, Motorola, Linksys, Dell, HP, and many more all integrated on the network. It is important to know what companies run what portion of your network so you aren’t left with outdated software or hardware and vulnerable. With the advancement of mobile technology and networking, the global implications of network security are growing vastly. Everyone needs to be connected at all times with tablets and smartphones which means security implications are inherent in all corners of the world. Understanding where employees are travelling throughout world and what threats are imminent in that specific area are vital to the proper security protection. It is also important to understand that other companies or countries that you are doing business with may not take network security as seriously as you do. This means you need to ensure employees don’t use any external media on the company device as it could contain viruses that would potentially give hackers access to all network resources through the mobile device. With information constantly evolving and being a part of everyone’s life, the global implications of network security will only grow hand in hand. As you can see from the data presented in this essay, network security is a vital aspect to consider while designing a network. The network is only as good as it is secure, meaning the network can’t provide any organizations with useful data sharing if the integrity is compromised. Organizations thrive off of the ability to store and share data with other organizations and it is the network design’s team to set the company up for success with proper security measures. There are a lot of different aspects involved with a good security policy and it is important to constantly revise and update these practices to stay in line with the latest threats.

References

Savitz, E. (2012). 5 key computer network security challenges for 2013. Retrieved from http://www.forbes.com/sites/ciocentral/2012/12/11/5-key-computer-network-security-challenges-for-2013/
Shinder, D. (2007). 10 Physical security measures every organization should take. Retrieved from http://www.techrepublic.com/blog/10-things/10-physical-security-measures-every-organization-should-take/
Sophos Labs (2014). Trends to Watch in 2014. Retrieved from https://www.sophos.com/en-us/security-news-trends/security-trends/network-security-top-trends.aspx
Manky, D. (2010). Top 10 vulnerabilities inside the network. Retrieved from http://www.networkworld.com/article/2193965/tech-primers/top-10-vulnerabilities-inside-the-network.html

Similar Documents

Free Essay

Orascom Case Study

...international telecommunications market. OTH is considered among the largest and most diversified network operators in the Middle East, Africa and Asia, with a mobile telephony penetration of approximately 48% in those regions, and more than 80 million subscribers as of March 31st, 2009. Orascom Telecom Holding operates GSM networks in Algeria (OTA), Egypt (Mobinil), Pakistan (Mobilink), Bangladesh (Banglalink), Tunisia (Tunisiana) and North Korea (Koryolink). OTH has an indirect equity ownership in Globalive Wireless which has been granted a spectrum license in Canada. Through its subsidiary Telecel Globe, OTH also operates in Burundi, the Central African Republic, Namibia and Zimbabwe. At OTH, all the information exchanged between the corporate headquarters and OTH subsidiaries on one side, and external vendors on the other side, is communicated by email. Email is therefore a mission-critical business application on which all corporate employees rely. Unfortunately, with 90% of its 1.5 million daily emails consisting of spam, OTH was rapidly overwhelmed by this type of malware. In order to protect its corporate email servers and users against spam and viruses, the IT security department of OTH had installed a third-party software application on the exchange servers. However, this security solution soon turned out to be ineffective both in terms of robustness and accuracy. Mina Samir, IT security manager at OTH recalls: “Spam was seriously affecting our business. Many relevant emails...

Words: 971 - Pages: 4

Premium Essay

Ntc 411 Week 5 Individual Assignment

...As utilization of network, technology evolves so does security issues surrounding it. The growing demand of E-commerce on the internet continues to set infinite risks of being attacked. Security is paramount for safe and secure E-commerce sites. As properly installed and maintained firewall continue providing security, it is not adequate to provide defense against intrusion. For adequate defense against intrusion, Additional security appliances such as IPS, network scanners, IDS, and vulnerability assessment kits should; be part of the system. It is essential to protect one’s computer network in today’s global market environment. Intrusion detection system (IDS) is one of the significant software that can monitor intrusion activities. In Afghanistan we utilize and IPS, IDS, web proxy, event collector, and firewall as a security solution. As the demand of network, technology in the network continues to flood the market, so does its vulnerability. There are multiple ways of detecting an intrusion into the network. Intrusion detection products are increasingly becoming famous in the global market and are major intrusion detecting devices. Traditionally, firewall was believed to provide adequate defense against network intrusion, however; the recent growth of new software has prompted for other defense appliances. One of the fundamental principles of intrusion detection is to detect of any attempt of intrusion and alert the operator. This way, it will be possible for my boss...

Words: 1015 - Pages: 5

Premium Essay

Sec 402 Wk 8 Assignment 2 - Implementing Network and Personnel Security Measures

...SEC 402 WK 8 Assignment 2 - Implementing Network and Personnel Security Measures To Purchase Click Link Below: http://strtutorials.com/SEC-402-WK-8-Assignment-2-Implementing-Network-and-Personnel-S-SEC4024.htm SEC 402 WK 8 Assignment 2 - Implementing Network and Personnel Security Measures The security consulting firm that you work for has been awarded a contract to implement a new IT Security Infrastructure to secure the Information Technology data assets of a local government agency. This agency has many remote workers that are in the field and need to connect back to the agency’s system servers. The remote workers use a wireless network infrastructure to connect their electronic pads to servers located within the local government’s facility. The remote workers have needs to access property records, cite zoning violations electronically, and validate building permits. The public demand to expand IT services has grown faster than its ability to provide an adequately secured infrastructure. In fact, this government entity was previously featured on the news for having minimal security controls and methods for accessing property tax information of citizens. The inadequate security allowed many construction trade businesses to illegally access property records and zoning violations. Your role in this project is to enhance and optimize the security mechanisms for accessing these systems. Write a four to five (4-5) page paper in which you: 1. Create an information...

Words: 415 - Pages: 2

Premium Essay

Risks Associated with Internet Based Transactions

...University of Phoenix by; Kari Sherwood 10/05/2014 Abstract University of Phoenix by; Kari Sherwood 10/05/2014 Network security Hospitality industry Network security Hospitality industry NEN Network security is an important aspect of system administration. The article focuses on the purpose of network security, the kind of threats that it faces and the implementation of a security strategy. The basic idea of networks is allow people remote access to geographically distant resources without having to be physically present. It has also been designed to send data back and forth, to stay connected. There are large networks and small networks, but size is irrelevant in terms of importance of network security. The purpose of network security is to protect the network and its component parts from unauthorized access and misuse. Networks are vulnerable because of their inherent characteristic of facilitating remote access. For example, if a hacker wanted to access a computer not on a network, physical access would be vital. However, with networks in the picture, it is possible to bypass that particular security aspect. Therefore, it is vital for any network administrator, regardless of the size and type of network, to implement stringent security policies to prevent potential losses. There are a number of potential pitfalls that may arise if network security is not implemented properly. Each business will identify with the need to keep certain critical information private...

Words: 683 - Pages: 3

Premium Essay

Se571 Principles of Information Security and Privacy

...Aircraft Solutions Security Weaknesses Final Project SE571 Principles of Information Security and Privacy Keller Graduate School of Management Table of Contents Executive Summary ……………………………………………………………………..1 Company Overview……………………………………………………………………...1 Security Vulnerabilities .................................................................................................1-3 Recommended Solution.....................................................................................................4 A Software/ Hardware Bundle Example Solution 4 Cost of Hardware/Software…………………………………………………………...3-6 Summary……………………………………………………………………………….…6 References…………………………………………………...……………………………7 Executive Summary This paper’s purpose is to point out and resolve the security vulnerabilities of Aircraft Solutions. Company Overview My focus is on Aircraft Solution’s weaknesses, after gaining employment with AS I have noticed some problems. Two Security Vulnerabilities In the beginning I see that all the computers have independent antivirus software and firewalls on the servers. The diagram shows that the CD has no firewall at all and is still connected to the headquarters server behind its firewall. The CD is directly connected to the net. This could be a good input for an attack. IT, Finance, S&M and the DD are all at risk for this weakness at this point. This can be a direct in for someone...

Words: 1725 - Pages: 7

Free Essay

Firewall Security Project

...Bose Insurance Services Firewall Security Project Business Requirement and proposed Solution Report CIS 343 July 10, 2013 Dr. Table of Contents Executive Summary 3 Introduction/Background and History 4 Issues faced and specific needs to be solved by installing upgrades 5 Projects Assumptions and Constraints 7 Business Requirement ….………………………..………………………………………..8 Definition of Terms ….……………………………..……………………………………..9 Project Scope...……………………………………..……………………………………10 References…………………………………………..……………………………………13 Executive Summary The objective of this paper is to educate both the senior management of Allen & Bose Insurance Inc. on the network security threats that exist with our current network design. The enclosed report presents an analysis on Allen & Bose Insurance Services current security posture and highlights the issues we have face over the past year as well as industry best practices and recommended updates we should make to our network security design that will protect the organization from the myriad of security threats that are out there. Introduction/Background and History Allen & Bose Insurance Services has become a dynamic and intricate player in the automotive and home insurance market. The company has grown from 25 employees in one office to over 225 employees in 3 offices. In the early days the computer systems that were used were on a close network of networked computing systems...

Words: 1848 - Pages: 8

Premium Essay

Integrative Network Design

...Integrative Network Design NTC/362 Integrative Network Design Project Kudler Fine Foods is one of the biggest and fastest growing food companies in the Unites States. Because of this fast expansion there are expected and often increased goals that must be done in order to keep all parts of the company working as they should. One of these areas that must be kept up to date and secured at all times is its integrated network. Again because of the company’s recent growth there will be challenges that will happen especially with the network so a good integrative network design must be developed in order to continue this positive trend both in present and in the future. Kudler Fine Foods is taking the next step to upgrade the existing infrastructure with new wireless technology which will provide a better communication link for not only all of the stores, but for all of the employees as well. Kudler Fine Foods wants to implement a new network design that will connect their three locations that is spreaded out across the U.S. With the new systems and servers the ability to maximize the company’s profits will increase overnight. This new inventory system will allow the stores POS systems to alert the warehouses to ship more products when they are running low automatically. This will eliminate the need of wasted man hours checking the stock. Using a Wide Area Network (WAN) would be the best choice for connecting the three locations together. They also want to implement a...

Words: 3955 - Pages: 16

Premium Essay

Wgu Itsecurity Capstone

...Capstone Project Cover Sheet Capstone Project Title: ABC Inc. Firewall upgrade Report Student Name: Michael Wakefield Degree Program: BS- IT Security Mentor Name: Dave Huff Signature Block Student’s Signature Mentor’s Signature Table of Contents Capstone Summary 3 Review of Other Work 13 Rationale and Systems Analysis 19 Goals and Objectives 25 Project Deliverables 28 Project Plan and Timelines 30 Project Development…………………………………………………………………………………………………………………………….31 Additional Deliverables………………………………………………………………………………………………………………………….35 Conclusion…………………………………………………………………………………………………………………………………………….35 References 37 Appendix 1: Competency Matrix 38 Appendix 2: Cisco ASA 5555-X Firewall Specifications…………………………………………………………….40 Appendix 3: ABC Inc. Project Schedule…………………………………………………………………………………….44 Appendix 4: High-Availability Design Screenshots……………………………………………………………………45 Appendix 5: Screenshots of inside to outside access; outside to DMZ access; NAT rules and configurations; and performance graphs and performance results….........................................51 Capstone Report Summary Internet of Everything (IoE) and “Big Data” equates to competitive advantages to the modern business landscape. Numerous white papers are circulating on the Internet highlighting the business case supporting the IoE initiative. For instance, in a white paper conducted by Cisco Inc. on the Value Index of IoE in 2013 reported the following: ...

Words: 9337 - Pages: 38

Premium Essay

Fundamental of Network

...Fundamentals of Networks Alhaji Mansary University of Phoenix Integrative Network Design Project Part 3 Prof, Marjorie Marque 12/12/12. Kudler Fine Foods Network: Final Introduction Kudler Fine Foods is on their way to upgrading their present network infrastructure with better wireless technology that will provide an improved communication medium both for the stores and employees. This will help maximizing the company’s profits with the aid of the new systems and servers performance. The new inventory system will let a store’s POS system to alert the warehouses that they need to ship more products already when the store is running low in stock. This will eliminate or at least make the man-hours needed in checking the stock. VoWLAN (Voice over WLAN) is the one to provide all the communications needed to be done by taking or making calls while providing the services needed by the customers by using the same medium. Other technological Advances will provide real-time network analysis and security monitoring which will bring overall benefits to the Kudler Company. Network Overview Kudler’s network infrastructure is now becoming very old. The stores are on separate networks so the bus network topology that they have does not allow effective communication already. This is a major problem because of the fact of lacking central location for network servers and backups or security set-up. This is the reason an enterprise wireless WAN is being rolled...

Words: 3022 - Pages: 13

Premium Essay

Information and Technology

...marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human Resources Team and Management team, for perspective departments. The company works primarily through a LAN/WAN set up, and work is performed primarily over the web. CPO must keep personal information safe, as they are trusted by each customer. CPO must also keep the information held within the facility and network safe, belonging to their employees. The Human Resource Team and Management...

Words: 1127 - Pages: 5

Premium Essay

Next Generation Firewall

...Final Project Next Generation Firewall By: Edward Caudill Submitted as partial fulfillment of the requirements for the Bachelors of Computer Science Independence University April, 2015 Copyright ( 2015 Edward Caudill This document is copyrighted material. Under copyright law, no parts of this document may be reproduced without the expressed permission of the author. Approval Page INDEPENDENCE UNIVERSITY As members of the Final Project Committee, we certify that we have read the document prepared by __________________ entitled ________________________________________ and recommend that it be accepted as fulfilling the Capstone requirement for the Degree of ________________________________________ ____________________________________________________________Date: _________ Name of Course Instructor ____________________________________________________________Date: _________ Associate Dean Signature ____________________________________________________________Date: _________ Senior Associate Dean Signature I hereby certify that I have read this document prepared under my direction and recommend that it be accepted as fulfilling the dissertation requirement. ____________________________________________________________Date: __________ Course Instructor Abstract Taking advantage of a vulnerability (i.e., an identified weakness), in a...

Words: 3381 - Pages: 14

Premium Essay

Solutions of This Questions

...5: IT Security, crime, Compliance, and Continuity Multiple Choice 1. ______ refers to viruses, Trojan horses, spyware, and other types of disruptive, destructive, or unwanted programs. a) Bad program b) Hacking c) Malware d) Zombie computer 2. Social networks and cloud computing increase vulnerabilities by providing _____. a) a single point of failure b) an easy way to steal data c) an easier way for data to be read over networks d) extra security over a network 3. _______ is a deceptive attempt to steal a person’s confidential information by pretending to be a legitimate organization such as PayPal. a) Inquiry b) Lying c) Phishing d) Polling 4. Some essential defenses against malware and botnet defenses include all of the following except: a) antivirus software b) constant monitoring by a human c) intrusion detection systems d) intrusion prevention systems 5. ______ fraud refers to the deliberate misuse of the assets on one’s employer for personal gain. a) Occupational b) Human c) Malicious d) Accidental 6. One of the worst and most prevalent crimes is/are _____. a) phishing b) viruses c) identity theft d) malware 7. Physical control is an example of what category of control? a) Application b) Basic c) Major d) General 8. Network Security measures involve ___ types of defenses referred to as layers. a) 4 b) 3 c) 10 d) 5 9. _____ is a type of security protocol...

Words: 399 - Pages: 2

Premium Essay

How to Plan for Security

...for Security i). Statement of Policy This policy statement seeks to address the optimum and responsible use of the wireless local area network WLAN facility available at the university in relation to specific network security issues. The issue of concern in this policy is the promotion of responsible use of the WLAN facility among the university’s student and workers. The strategy aims at preventing security problems that may arise from the misuse and malicious exploitation of the facility by people granted approval to access the university’s WLAN information systems. a) Scope and Applicability The scope of this policy statement covers the hardware, software and access protocols associated with the WLAN use by students and workers at the university. The policies adopted will seek to regulate access permissions for the users of the WLAN facility and to promote responsible use in line with policies outlined in this policy document and by industry standards and legal requirements of use. b) Definition of Technology Address The WAN is available for use by the students and workers within the university. The WLAN facility provides access to information systems meant to facilitate the learning and worker needs by providing information access and software platforms. c) Responsibilities The administration and management of the WLAN facility is the responsibility of appointed network administrators at the university’s faculty of Information and Communication Technology. The network administrators...

Words: 1907 - Pages: 8

Premium Essay

Cmgt

...Individual Assignment: Security Monitoring Activities CMGT/442 Introduction Information Technology (IT) and E-commerce have been on a constant up-rise, over the past couple of decades. Many organizations have found ways to grow and remain profitable, by creating a good mixture of e-commerce and IT. E-commerce can cover a range of areas, but focus mainly on internet sales and product marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human...

Words: 1199 - Pages: 5

Free Essay

Security Solutions

...Security Solutions Jonathan E. La Rosa July 22, 2014 NTC/411 Randal C. Shirley Security Solutions Firewalls have been around for years. In that time, they have protected various different organizations and corporations from possible hacker attacks. They play a critical part in protecting the internal network and making sure that packets are screened and checked before being provided access. Although firewalls are extremely powerful, especially in today’s world, they cannot be the only source of protection that the network can have. Various other technologies need to be used in order to actually make sure that the data is secure and that information has not be tampered with. Intrusion Prevention Systems, or IPS’, as well as Intrusion Detection Systems, or IDS’ are great in making sure that the network is free of any attacker or unwanted individual. These different technologies working together can provide the best protection possible, although they do have to be monitored in order to make sure they are working in the best way possible. Firewall Protection Managing firewalls is a fundamental function in making sure a network is secure. Network security managers are the main individuals who have to make sure that the firewall is constantly working in the most effective and efficient way possible. The rules that are in place within this device can and will affect the network and how it responds. Firewalls need to be constantly upgraded and put with the latest...

Words: 948 - Pages: 4