Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Network server security
Network server security
Network server security
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Network server security
Vulnerabilities are like a thorn in the side of every single organization doing business today. In the IT world vulnerabilities are bugs or flaws, a weakness, or an exposure of an application, system, device, or service which could lead to a failure of confidentiality, integrity, or availability (Liu & Zhang, 2011). They are to companies today what the black plague was to Europe in the 1300’s. It doesn’t even matter if the organization is connected to the internet or not it’s still vulnerable to some type of attack. Regardless of what a company actually produces and what its mission statement states their number one internal concern is “vulnerability”. How do IT Departments and IT Managers combat these threats? Every company has some type of Cyber Security team or department. Cyber security is defined by the United States Computer Emergency Readiness Team as protecting that information by preventing, detecting, and responding to attacks (McDowell & Householder, 2009). Every year companies spend billions upon billions of dollars in cyber security assessing and combating possible vulnerabilities of their organization's hardware and software systems, transmission media, local area networks, wide area networks, enterprise networks, Intranets, and Internet. This paper will evaluate 3 company’s networks and assess their vulnerabilities.
Company A
Weebles, Inc has several hundred employees in their main office and two hundred at the shipping plant just a few miles away. The LAN or Local Area Network uses 100 gb/1000gb connectivity speeds over Ethernet circuits. Local Area Networks cover small geographical locations and enable individual computers to communicate with each other to share information (Pang, 2011). The Wid...
... middle of paper ...
... external IP address.
Works Cited
Liu, Q., & Zhang, Y. (2011, March). VRSS: A new system for rating and scoring vulnerabilities. Computer Communications, 34(3), 264-273. Retrieved June 08, 2011, from Computers & Applied Sciences Complete.
McDowell, M., & Householder, A. (2009, May 6). Cyber Security Tip ST04-001. In US-CERT. Retrieved June 08, 2011, from CSEC610 9041 Webliography.
Valacich, J, & Schneider, C. (2012). Information Systems Today: Managing in the Digital World 5th Edition. (pp. 12-37). Pearson. ISBN-13: 978-0-13-706699-5.
UMUC. (2011). Custom Textbook for CSEC 610 (pp. 1-13). Hoboken, NJ: John Wiley & Sons, Inc. ISBN 978-0-470-92331-3.
Pang, L. (2011). The vulnerability of information systems in CSEC610. Course module 2 posted in University of Maryland University College CSEC 610 9041 online classroom, archived at: http://webtycho.umuc.edu
Saunders, C. S., & Pearlson, K. E. (2009). Managing and Using Information Systems. John Wiley&Sons, Incorporated.
...6. Fisher Center for Information Technology & Management, University of California in Berkeley. June 1995
Vulnerability scanning is an automated process that is conducted by an organization’s IT staff to identify any vulnerability that their information systems might possess and used to help “secure your own network” (Bradley). It is also used by hackers that are conducting reconnaissance on an organizations network to find any vulnerability that they might exploit. These next few pages will provide information on vulnerabilities, the many different forms of vulnerability scanning, the different types, pro’s and con’s, and costs.
Security helps the organization meet its business objectives or mission by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets through the selection and application of appropriate safeguards. Businesses should establish roles and responsibilities of all personnel and staff members. However, a Chief Information Officer should be appointed to direct an organization’s day to day management of information assets. Supporting roles are performed by the service providers and include systems operations, whose personnel design and operate the computer systems. Each team member must be held accountable in ensuring all of the rules and policies are being followed, as well as, understanding their roles, responsibilities and functions. Organizations information processing systems are vulnerable to many threats that can inflict various types of damage that can result in significant losses (Harris, 2014). Losses can come from actions from trusted employees that defraud the system, outside hackers, or from careless data entry. The major threat to information protection is error and omissions that data entry personnel, users, system operators and programmers make. To better protect business information resources, organizations should conduct a risk analysis to see what
Haag, S. & Cummings, M. (2008). Management information systems for the information age (Laureate Education, Inc., custom ed.). Boston: McGraw-Hill/Irwin.
Spagnoletti, Paolo. Organizational Change and Information Systems: Working and Living Together in New Ways. Berlin: Springer, 2013. Internet resource.
Penetration testing - using tools and processes to scan the network environment for vulnerabilities, [03& T, J.K et al. 2002] there are many different types of vulnerability assessments. Penetration Testing focuses on understanding the vulnerabilities of components that you’ve made available on the network as seen from the perspective of a skilful and determined attacker who has access to that network. It will provide a thorough overview of the ...
In addressing the problem, the proposed research will use the case study method to examine the plan, design, and implementation of WLAN technologies at Berean. At present, the non-wireless local area network (LAN) technologies employed by Berean include 10/100BaseT Ethernet at each desktop. Ethernet ports at the desktop are switch connected to an Asynchronous Transfer Mode (ATM) T1 backbone. Berean¡¦s one remote facility connects to the network using switched Frame Relay services along with Internet Virtual Private Network (VPN) connections.
Whitman, M., & Mattord, H. (2010). Management of information security. (3rd ed., p. 6). Boston, MA: Cengage Learning.
Unequivocally speaking, the threat of a cyber-attack has become one of the most critical domestic and national security challenges we face as a nation today. Infrastructures supporting government operations are ...
Zeleny, M (ed.) 2000, The IEBM handbook of information technology in business, Thomson Learning, London.
Palvia P., Palvia S. & E. Roche (1996) Global Information Technology and Systems Management. Ivy League Publishing
Paige B., Brian D. and Cameron W. (2012). Business Driven Information Systems, 3rd Canadian Ed. 300 Water St, Whitby, ON L1N 9B6, McGraw Hill Ryerson Ltd
Perry, B., 2005, Organisational Management and Information Systems. [e-book] Oxford; Elsevier. Available at: Google Books . [Accessed 14 November 2013]
Advances in technology have changed businesses dramatically, in particular the communication and information technology that are conducted in firms, which changed the appearance and pace of businesses over the past few decades. ICT in particular, has evolved a lot over the past 30 years; important information can be stored in computers rather than being in drawers enabling information to be transferred at a greater volume and speed (Guy, 2009). ICT has also expanded various forms of telecommunications and workload conducted in businesses, internet examples of this include: e-mails can be used to communicate with others...