Downloading any unauthorized software on a company electronic can be very dangerous. “They might accidentally choose to share drives or folders that contain sensitive information, or they could save a private file to a shared drive or folder by mistake, making that private file available to others “(Bureau of consumer protection, 2010). This kind of action can open doors to many vulnerabilities and threats that can peril organizations’ sensitive information. In an organization sharing of internal documents via emails is a norm. If untrusted file-sharing software are installed, there is a high chance of getting information hacked. Employees that do not take any precaution when installing any kind of software can lead to installation of spyware, malware, virus, and trojans on the systems. According to Jeff Goldman the survey that was conducted with 308 IT professional in US, 46 percent believed that data is leaked from companies due to use of file sharing products and 84 percent said using file sharing and ...
... middle of paper ...
...as well as detect any policy violation that can be another good security feature for an organization. This can enhance the overall network performance. One disadvantage of DMZ is that it is difficult to properly configure proxies; hence, malicious attacker can gain control of a DMZ compromising internal network.
After analyzing the advantages and disadvantages of different technological based solution against the risk and vulnerabilities associated with peer-peer unauthorized file sharing software, I believe proper installation of updated firewall between router and internet, as well as DMZ is the best solution that can provide great security to an organization resulting in better performance. It will also isolate network segments from outsider who are trying to gain unauthorized access. Moreover, Employees who are violating policy can be apprehended.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Cyber security is defined as the protection of information on computer systems and the protection of the hardware that supports or stores the information on computers or servers. This level of protection can include controlling physical access to the hardware, as well as protecting against harm that may come from local or remote network access, data and code injection and due to malpractice by system operators, who may have been tricked by outside personnel to place the system in a compromising situation.... [tags: Computer security, Information security, Computer]
833 words (2.4 pages)
- ... Data from the corporate site in Chicago flows through the internet to the branch site 8 miles away, the connection to the web, in this case, is at a high of 50Mbps due to the sensitivity of information processed which includes business and corporate information. The business site houses 300 employees who only needs access to corporate resources and the internet. The enterprise network should be protected by all means since it houses sensitive business and corporate data. The remote site is located 8 miles from the business site and has 20 employees who need access to all the resources at the agency site and the internet at a speed of 3Mbps.... [tags: Information security, Security, Risk, Attack]
1074 words (3.1 pages)
- ... 3.2 Employees Information technology outsourcing banks should also be competent in handling proper planning which provides training and development for employees in technology and teach them new skills required in discharging their responsibilities in new areas of information technology and management. Moreover, this reminds company representative’s work at least some of the CA 7 operator firm has taken in India to find qualified professional information technology candidates. The problem is caused by a less experienced employee making a big mistake while performing a routine task of backing up an upgrade to CA 7 tool is generally in the field of information technology.... [tags: hackers, keystroke, loggers, banking]
822 words (2.3 pages)
- Analysis: The American Perspective On Hackers The issue of public information has always been a controversy in our world. One of our country’s founding arguments was based on the necessity of free speech and free information. Many now believe that our government is being overly restrictive on information, blocking and controlling some aspects of free speech that first amendment advocates feel are necessary to maintain our American society. These advocates of free information have been using the nickname “hackers” for over twenty years, but improper use by the media has stretched the word to slanderous levels.... [tags: social issues]
1593 words (4.6 pages)
- ... One of the recent consumer information hacks that left an impact on me had to do with Target when the cyber criminals targeted the company that monitored Target 's HVAC systems and was then able to hack completely into the Target 's database. This specific hack left an impression on me when I found out that millions of consumers were affected due to a vulnerability in Target 's HVAC vendor 's system, which also had access to Target 's payments network. As our world becomes more reliant on technology and networks, it is terrifying to think about all of the harm and damage that malicious hackers could do if they were able to successfully hack into the "right" organization such as a militar... [tags: Information security, Computer security, Security]
1152 words (3.3 pages)
- The first main threats of IS/IT outsourcing are the issue of trust because it has become very important things to ensure that third parties into personal or confidential information to protect that information from misuse and not authentic. Basically, customer organization is needed increasingly being held responsible for securing and protecting customer information. The protection of customer they need use the approved authorization to avoid problem or misuse for those who like hackers. Furthermore, it also concern in regard to unauthorized and unintended disclosure of government confidential or proprietary information, as well as intellectual property.... [tags: confidential, hackers, customer information]
577 words (1.6 pages)
- Abstract: At this point in time the ubiquity of personal and sensitive information of businesses and individuals who participate in the world economy is greater than ever. As in the past, your information could be found on an old credit card statement inside your garbage can at the end of your driveway; just waiting to be plucked by the next crafty criminal who can get his hands on it. Now your sensitive personal information is inside not only in your garbage can but as a result of the last couple of decades, information technology now has the ability to send your personal information in packets of data and over telephone wires.... [tags: Computers]
3662 words (10.5 pages)
- The Global Security Policy Webster characterizes "policy" as a "high-level overall plan embracing the general goals and acceptable procedures". It is, for the most part recognized that an organization 's information security policy should be the foundation of its information security program. Particularly in case of global organizations, the necessity for sensible policies and the issues intrinsic in their creation them are exceptionally critical. This paper acts as a dialog of probably the most widespread data security strategy-related matters that are familiar to global organizations and offer some approaches to dealing with them.... [tags: Security, Information security, Computer security]
1215 words (3.5 pages)
- With the growth of information technology use in organization, there is also a parallel growth in some individuals or businesses engagement in some unethical behaviors relating to the use of information technology. That is a good enough reason why it would be vital for education systems and businesses to tackle about the ethical concerns of information technology usage and to come out with code of ethics to restore ethical issues and violations. According to Brooks (2010), there are four major problems which concern the managers of information technology the most.... [tags: data, protection, privacy]
1269 words (3.6 pages)
- ... Both the client and server have keys on encryption keys. When a backup is preformed the data is encrypted at the client before being sent to the server for storage on tape. This added an extra level of security to your backup over the network or if a third party manages to get hold of the backup tape. The keys used to create the encryption should be record and stored in a secure place. In the event of a system failure the data would be irretrievable without the encryption keys. Disaster recovery options are included with larger base packages.... [tags: threats, backup, protection, network]
757 words (2.2 pages)