Consequently, having a strong IT security environment as well as having the experience to maintain it, is an important asset in most network infrastructures today. The evolution of the Internet opened the doors to many possibilities, such as productivity and business development in many private sectors, as well as in the government sector. For example, the department of defense cannot afford to have weaknesses in their IT security system, because there are many malicious intruders, such as ISIS, that would love to get their dirty paws on our government’s top secret information (Belovich, S. 2010).
I was one of the system administrators at the State Department for a few years, and it was insane all the security clearances that someone has to have to work there. However, I was fortunate to already have my top secret clearance from the US Marines and all they had to do is transfer this DOD clearance to theirs. Even though this was a good job and excellent work experience, the stress levels were always high for me. For example, before I went home, I made sure that I reviewed all the reports and took all the necessary preventive steps in order to make sure that the system was not hacked....
... middle of paper ...
...upgrading their anti-virus software, or downloading the latest security patches for the network. Today, a system administrator has bigger responsibilities that involve taking care of the network at a bigger scale. Some of these duties are:
1. To monitor the system for any suspicious activity (Stewart, J. 2014).
2. Make sure that the network’s security policies and firewall is properly configured (Stewart, J. 2014).
3. Make sure that employees or users only have the allowed authorized access to the system’s data (Stewart, J. 2014).
4. Implement security policies on the network server’s operating system (e.g. Make sure every user changes his password every 60 days) (Stewart, J. 2014).
5. Coordinate with board of directors or high leaders of the company, of any necessary upgrades, or new designs for the current IT network security infrastructure (Stewart, J. 2014).
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- INTERNET OF THINGS Security, threats, vulnerabilities INTRODUCTION There is so many things about security issues, vulnerabilities and the threats in the Internet Of Things(IOT). There is number of growing IOT attacks and some attacks are able to exploit vulnerabilities in the underlying Linux-based operating systems found in several IoT devices and routers In this we’ll review security incidents and vulnerability to build an model of the threat environment. We’ll learned from these incidents, highlight common threats and identify attack patterns.... [tags: Computer security, Security, Access control]
844 words (2.4 pages)
- The Ethics of Publicizing Security Vulnerabilities Abstract: In 1988, Robert T. Morris Jr. released the Internet Worm Virus, which essentially shut down the entire internet for a day. Morris wrote the virus using known vulnerabilities in the UNIX operating system. When these vulnerabilities are discovered, should they be publicized or kept secret to prevent further attacks? These issues relate closely to the concepts of open source versus proprietary software development. In 1988, Robert T.... [tags: Free Essays Online]
1468 words (4.2 pages)
- I have identified a few plausible threats/vulnerabilities, which originate with the location of the servers, potential equipment failure, social engineering, denial of service (DOS), and the malware that I believe you will be interested in taking a gaze at. The first threat or vulnerability I would like to discuss is the locality of the servers all located at headquarters in one place. If a natural or even fabricated disaster transpired, the situation would debilitate the company’s entire infrastructure.... [tags: Risk management, Risk, Malware, Computer virus]
1314 words (3.8 pages)
- Surfing the Internet we can find thousands of different Websites from Commercial, Personal, Educational, and Entertainment Websites to News Websites just to mention some of them. The importance of implementing a secure line between the vendor and the client is very important, when handling delicate information such as credit card numbers when making a purchase or just by logging in our bank account on-line. Security measures need to be in place in the vendor site in order to protect our interests.... [tags: Internet]
736 words (2.1 pages)
- Vulnerabilities are like a thorn in the side of every single organization doing business today. In the IT world vulnerabilities are bugs or flaws, a weakness, or an exposure of an application, system, device, or service which could lead to a failure of confidentiality, integrity, or availability (Liu & Zhang, 2011). They are to companies today what the black plague was to Europe in the 1300’s. It doesn’t even matter if the organization is connected to the internet or not it’s still vulnerable to some type of attack.... [tags: Information Technology ]
1701 words (4.9 pages)
- Businesses and people are using Internet for entertainment, e-business and e-commerce, social networking, and communication to the people and business, but there have always been threats to the Internet Security. Internet security is major concern in field of technology, because there are various personal, business and government data on the Internet. Today every businesses and organizations have their own security systems to reach their goals of information security. Internet security systems are created to reduce cyber attack risks, reliability, maintain confidentiality, and compliance with privacy laws and national security laws.... [tags: Security, Computer security, Internet]
962 words (2.7 pages)
- From the very beginning of the internet malicious code was being written. In fact very the first harmful code was created on accident. Going back to the 1949, Self-replicating programs were being developed. (Nash) This was even before the time of the internet during this time code was spread via floppy disks. The Very first worm that was released accidentally by a 23 year old Cornell student Robert Morris. (Nash) He unleased the worm that caused great harm it spread across the internet at a phenomenal rate.... [tags: Computer virus, Malware, Trojan horse]
1191 words (3.4 pages)
- INTRODUCTION With cyber-attacks on the continuous rise, organizations public and private must address computer security vulnerabilities. SANS Institute has revealed “unpatched client-side software applications” as the top priority vulnerability for organizations globally. In conjunction with unpatched client software, vulnerable “Internet-facing web sites” can result in an organizations infrastructure to be compromised. In this study I will address the issue of unpatched client software, the impact to an organizations infrastructure, and patch management as a vital mitigation solution.... [tags: Technology]
1337 words (3.8 pages)
- I. Introduction Computer crime has been defined as, “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data.” The purpose of this work is to examine breaches in computer security. As a future IT professional, with the possibility of being in charge of protecting the security of a database, it is relevant to take a “hacker approach” to security.... [tags: essays research papers fc]
2448 words (7 pages)
- When historians look back at the latter half of the twentieth century, they might well remember it less as the time man walked on the moon and more as the time when the Internet was born. The Advancement Research Projects Agency Network, known as the ARPANET, was developed in the 1960's by the U.S. Department of Defense. This was the world's first operational informational sharing network, and the predecessor of what we now call the Internet. Although the creation of the Internet was primarily to allow the sharing of resources, its true popularity came in the ability to send and receive mail.... [tags: Internet Web Technology Innovation]
1100 words (3.1 pages)