Tuesday, December 18, 2018
'Internet connections Essay\r'
'The security body implications of sharing Internet connections between FTD employees and stuff must(prenominal)inessiness be strong in order to match safety for both the clients and the employees. The master(prenominal) security surface such(prenominal) as entropy access must be implemented in such a way that the privilege given to the FTD employees which is controlled and manipulated. Controlling the web-browsing attire such as browsing illegal or unwanted web sites need also to be controlled, hence providing user access to email, web sites apply password and encryptions is essential.\r\nKeeping off the malicious users from accessing valuable breeding and other external training that crapper be used against the FTD employees and the authorities needs to be taken under(a) consideration. Sending emails and other attachments must be allowed according to hierarchy of access permissions. unauthorised access to sensitive data must be prevented by implementing policies and procedures to prevent, detect, contain, and correct security violations. Such legal profession needs to be focused on somatic Security, Data Communications Security and Operating systems security.\r\nTools that john be used to enhance the security of computers connected to a nedeucerk ar called a firewall. When selecting firewalls, mavin must take into account such as easy installation and configuration, report of the attack by identifying time, location and type of attack, good maintenance and observe requirements, etc. The firewalls that should be used in the main site atomic number 18 Packet Filtering, Stateful Packet Inspection, Application-Level representative and Network Address Translation (NAT). To have a perfectly feasible operation and conduct the well-nigh proper ethical seam functions is the first anteriority for most companies and line of credites.\r\nThe most critical issue cerebrate with IT is IT security where the objective is to take effective mea tru steds to flow the menaces exist today in IT related business such as e-commerce. ââ¬Å"Security and risk focal point be tightly coupled with quality counsel and Security measures should be implemented based on risk analysis and in harmony with prime(a) structures, processes and checklists. ââ¬Â [5]. Today, most companies prefer electronic information oer traditional ship canal of storing and manipulation of information.\r\nData are stored in huge database and process using contrastive front-end softwareââ¬â¢s form anywhere in the world. ââ¬Å"Security is the protection of information, systems and services against disasters, mistakes and manipulation so that the likelihood and impact of security incidents is minimized. ââ¬Â [5]. IT security is do up of three main categories and they are Confidentiality, integrity and Availability. Confidentiality is when company or an organization has sensitive information and does not want to disclose such information to anyone ou tside the company.\r\nIntegrity is when companies want to update the system to adapt to future needs. As for availability, it is when a business implements a system it needs to make sure the system is up and running when needed. ââ¬Å"A threat is a danger which could affect the security (confidentiality, integrity, availability) of assets, pencil lead to a potential loss or damage. ââ¬Â [5]. Threats such as customerââ¬â¢s information screw be disclosed which can affect the believability of any company; companies information can be hacked by illegally, etc.\r\nââ¬Å"It is often impossible or very difficult to know if you are under attack and from whom and attackers sophistication has increased enormously in the last 5-10 years. ââ¬Â [5] Other threats such as virus development have increased at an imposing rate. However, the most common cause of security problems are as stated ââ¬Å"Human Error 52%, Dishonest people 10%, Technical bring down 10%, Fire 15%, Water 10% a nd Terrorism 3% and many computer crimes bills theft 44%, Damage of software 16%, Theft of information 16%, Alteration of data 12%, Theft of services 10%, go past 2%.\r\nââ¬Â [5]. There are many ways to improve the correct securities such as protect data and information using different forward-looking firewall software, understanding threats and its impact in order to be protected form it, calculating risk and decision making how to eradicate such risk. There are two basic ways to improve security and they are Bottom Up and Top Down. Bottom Up approach is not that precise but in order to implement such approach it is advisable to properly understand company policies, network analysis situs and companies operating procedure.\r\n'
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment