Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Secure the Network Devices for a Large Firm, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
To effectively secure the network devices for a large firm, it is first necessary to conduct a threat assessment. Larger companies tend to have large quantities of sensitive data and a requirement of this work is therefore to ensure the confidentiality, availability, and integrity of their data. To do so, I will begin by reviewing historical data that pertains to past incidents that have occurred within the organization, in similar organizations, and in the local area in which the business is housed. This data will be obtained primarily by conducting interviews and searching internet records. After all relevant information is collected, I will determine the reasons that these attacks have occurred and determine whether this particular company is at risk for these same reasons.
Based on the determined threat history, threat modeling will specifically identify security risks. The threat history assessment will be used primarily to provide the model with variables for effective analysis. This will be followed by a vulnerability assessment that includes the use of fingerprinting and scanning to determine which points of the network have a weakness that needs to be resolved. This phase of the assessment requires a thorough documentation review, citing the incidents, outage reports, and assessment reports that have been issued in the past. It is also useful to determine the vulnerabilities that the network has due to the likelihood of the employees to share their login information with unauthorized users.
To ensure that human error is not responsible for compromising network security, all employees should be required to utilize complex passwords that are changed frequently. Furthermore, reminder emails should be sent out to them that they should not share their username and password with individuals through email or phone, and be informed of how to change their password if they believe their accounts have been compromised. Next it is necessary to ensure that malware programs that are capable of obtaining this information is removed from company computers. Therefore, software should be regularly run to delete these programs.
In addition, the vulnerabilities that the network has can easily be identified using scanning and fingerprinting, but it is difficult to alleviate them without being aware of the specifics. However, in a majority of situations, a gap analysis report can be used to determine which exploits have been mitigated and which exploits are not mitigated (Gibson, 2011). A remediation plan can be implemented to resolve what is necessary to close this gap. Configuration management and change management can both be used to prevent future exploitations. Consistently updating these configurations and ensuring that changes are approved are simple ways to ensure that the network is protected and continues working properly.
After exploits have been mitigated, it is essential to determine whether these resolutions continue to be effective. It is important to repeat testing initially to ensure that is the case. Furthermore, the systems should be tested and reviewed periodically to determine if there are any new threats. Often, this involves simply repeating the network security analysis that had been conducted in the past to determine whether additional vulnerabilities are present. This process should be repeated frequently to ensure that sensitive information is maximally protected.
References
Gibson D. (2011). Managing Risk In Information Systems, Chapter 7. Jones & Bartlett Learning.
Gibson D. (2011). Managing Risk In Information Systems, Chapter 8. Jones & Bartlett Learning.
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee