Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
An Effective Network Security for a Large Firm, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
To perform an effective network security assessment for a large firm, it is essential to begin with consultation of the employees to determine how they contribute to the regulation of company information. This initial phase should consist of vulnerability assessments, which will be used to determine if employees are willing to give up their usernames and passwords if they are asked to do so through email, phone calls, and in person. It is essential to determine how many employees are willing to give up this information. Those that do have not been properly trained adequately and may need to be reminded that this information should not be distributed. Therefore, if there is a high rate of employee password reporting during this phase of the assessment, an education program discussing network security will be implemented.
Next, I plan to analyze the information technology assets of the company’s data, hardware, software, services, and the IT infrastructure (Gibson, 2011). It is essential to determine the threats and vulnerabilities that exist and to determine how to alleviate them. Risks will be determined by considering the likelihood that vulnerabilities will become threats. In this situation, footprinting can be used to effectively determine which servers and devices are performing which specific functions. This can be mapped, which will allow the company to understand what will happen when different components of the system are compromised. The information retrieved from this process can be used to indicate which systems and processes should be made redundant in case of invasion and to ensure that the system is operational and restorable in these instances.
After the initial risks are assessed, it is important to identify the risks that should be managed. This can be completed using a scanning process. Network scanning will be used to determine which of the company’s systems are currently online. Specifically, ping sweep will be used. Next, port scanning will be used to determine the services and applications that are using these systems to run using Nmap. Finally, vulnerability scanning will be conducted to scan the OS and determine its version number. Once weaknesses are identified, plans can be made to determine how the network can be protected.
To begin removing the vulnerabilities, it is necessary to select control methods. These will depend upon the specific vulnerabilities identified. These controls also aim to reduce the impact of invasions that occur as a consequence of the vulnerabilities. Next, it is necessary to test the controls to ensure that the solutions selected to prevent the vulnerabilities are effective. It may be necessary to mimic an attack to ensure that all relevant data remains protected after applying the protective intervention to the network.
Lastly, the implemented controls should be evaluated. It is likely that the controls will shift over time depending on the needs of the company and the vulnerabilities of their system. Thus, it is important to occasionally review prior controls that have been implemented to ensure that they continue to work well. When this is not the case, it is important to repeat the assessment so that the security needs of the network continue to be met. Failure to do so can result in attacks that put the company’s sensitive information at risk.
References
Gibson D. (2011). Managing Risk In Information Systems. Jones & Bartlett Learning.
Giri B. (2012). Ethical Hacking. Must Be Geek. Retrieved from http://www.mustbegeek.com/ethical-hacking/
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee
