All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Secure the Network Devices for a Large Firm, Essay Example

Pages: 2

Words: 549

Essay

To effectively secure the network devices for a large firm, it is first necessary to conduct a threat assessment. Larger companies tend to have large quantities of sensitive data and a requirement of this work is therefore to ensure the confidentiality, availability, and integrity of their data. To do so, I will begin by reviewing historical data that pertains to past incidents that have occurred within the organization, in similar organizations, and in the local area in which the business is housed. This data will be obtained primarily by conducting interviews and searching internet records. After all relevant information is collected, I will determine the reasons that these attacks have occurred and determine whether this particular company is at risk for these same reasons.

Based on the determined threat history, threat modeling will specifically identify security risks. The threat history assessment will be used primarily to provide the model with variables for effective analysis. This will be followed by a vulnerability assessment that includes the use of fingerprinting and scanning to determine which points of the network have a weakness that needs to be resolved. This phase of the assessment requires a thorough documentation review, citing the incidents, outage reports, and assessment reports that have been issued in the past. It is also useful to determine the vulnerabilities that the network has due to the likelihood of the employees to share their login information with unauthorized users.

To ensure that human error is not responsible for compromising network security, all employees should be required to utilize complex passwords that are changed frequently. Furthermore, reminder emails should be sent out to them that they should not share their username and password with individuals through email or phone, and be informed of how to change their password if they believe their accounts have been compromised. Next it is necessary to ensure that malware programs that are capable of obtaining this information is removed from company computers. Therefore, software should be regularly run to delete these programs.

In addition, the vulnerabilities that the network has can easily be identified using scanning and fingerprinting, but it is difficult to alleviate them without being aware of the specifics. However, in a majority of situations, a gap analysis report can be used to determine which exploits have been mitigated and which exploits are not mitigated (Gibson, 2011). A remediation plan can be implemented to resolve what is necessary to close this gap. Configuration management and change management can both be used to prevent future exploitations. Consistently updating these configurations and ensuring that changes are approved are simple ways to ensure that the network is protected and continues working properly.

After exploits have been mitigated, it is essential to determine whether these resolutions continue to be effective. It is important to repeat testing initially to ensure that is the case. Furthermore, the systems should be tested and reviewed periodically to determine if there are any new threats. Often, this involves simply repeating the network security analysis that had been conducted in the past to determine whether additional vulnerabilities are present. This process should be repeated frequently to ensure that sensitive information is maximally protected.

References

Gibson D. (2011). Managing Risk In Information Systems, Chapter 7. Jones & Bartlett Learning.

Gibson D. (2011). Managing Risk In Information Systems, Chapter 8. Jones & Bartlett Learning.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Relatives, Essay Example

People have been bound by bloodline and kinship since times immemorial. This type of relation is much more complex than being simply unified by common [...]

Pages: 1

Words: 364

Essay

Voting as a Civic Responsibility, Essay Example

Voting is a process whereby individuals, such as an electorate or gathering, come together to make a choice or convey an opinion, typically after debates, [...]

Pages: 1

Words: 287

Essay

Utilitarianism and Its Applications, Essay Example

Maxim: Whenever I choose between two options, regardless of the consequences, I always choose the option that gives me the most pleasure. Universal Law: Whenever [...]

Pages: 1

Words: 356

Essay

The Age-Related Changes of the Older Person, Essay Example

Compare and contrast the age-related changes of the older person you interviewed and assessed with those identified in this week’s reading assignment. John’s age-related changes [...]

Pages: 2

Words: 448

Essay

The Problems ESOL Teachers Face, Essay Example

Overview The current learning and teaching era stresses globalization; thus, elementary educators must adopt and incorporate multiculturalism and diversity in their learning plans. It is [...]

Pages: 8

Words: 2293

Essay

Should English Be the Primary Language? Essay Example

Research Question: Should English be the Primary Language of Instruction in Schools Worldwide? Work Thesis: English should be adopted as the primary language of instruction [...]

Pages: 4

Words: 999

Essay

Relatives, Essay Example

People have been bound by bloodline and kinship since times immemorial. This type of relation is much more complex than being simply unified by common [...]

Pages: 1

Words: 364

Essay

Voting as a Civic Responsibility, Essay Example

Voting is a process whereby individuals, such as an electorate or gathering, come together to make a choice or convey an opinion, typically after debates, [...]

Pages: 1

Words: 287

Essay

Utilitarianism and Its Applications, Essay Example

Maxim: Whenever I choose between two options, regardless of the consequences, I always choose the option that gives me the most pleasure. Universal Law: Whenever [...]

Pages: 1

Words: 356

Essay

The Age-Related Changes of the Older Person, Essay Example

Compare and contrast the age-related changes of the older person you interviewed and assessed with those identified in this week’s reading assignment. John’s age-related changes [...]

Pages: 2

Words: 448

Essay

The Problems ESOL Teachers Face, Essay Example

Overview The current learning and teaching era stresses globalization; thus, elementary educators must adopt and incorporate multiculturalism and diversity in their learning plans. It is [...]

Pages: 8

Words: 2293

Essay

Should English Be the Primary Language? Essay Example

Research Question: Should English be the Primary Language of Instruction in Schools Worldwide? Work Thesis: English should be adopted as the primary language of instruction [...]

Pages: 4

Words: 999

Essay