Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Security Issues and Communicate to Staff, Essay Example

Pages: 1

Words: 357

Essay

There are numerous reasons why a good security system has to be more than that of a simple firewall.  The following explains how ABC Company needs to be concerned about additional preventative measures for its new website.

Malicious logic issues –   This sort of cyber-attack is created by a person who assumes the identity of a legitimate user of the system.  This in turn violates the company security policy by the intent of malicious logic that is aimed at damaging the integrity of the system. This renders traditional access controls as ineffective. Examples of this are Viruses, Trojans and Worms.  The system needs additional protection via anti-virus screening software such as that provided by Norton or MacAfee. (Bishop, M. 2002)

Intrusion Detection –  This represents software that provides a holistic approach towards managing the safety  of the computer network and website.  It encompasses both the firewall and other components, as illustrated in the diagram to the right.  The IDS system  monitors all inbound and outbound traffic on the system and reports any suspicious activity or trends.   This includes those type of patterns that may indicate the someone is either trying to compromise or intrude into the system. (Marchette, D.J. 2001)

Intrusion Detection

Network Perimeter Security –  This essentially relates to the protection of the network by defence strength in depth.  It defines the boundary that exists between that of private and locally managed computer network systems.  This involves defining the perimeter of your computer systems and providing well defined security zones. (Buecker, A. 2008).  The example to the right shows an example of a perimeter network designed by Microsoft Corporation. (Microsoft, 2011)

Network Perimeter Security

References

Buecker, P. S. (2008). Understanding Perimeter Security. Austin, Texas: IBM.

Bishop, M. (2002). Computer Security : Art and Science. In M. Bishop, Computer Security : Art and Science (p. 461). New York : Addison Wesley.

Marchette, D. (2001). Computer Intrusion detection and network monitoring. London : Springer.

Microsoft. (2011, 10 27). Microsoft Technet. Retrieved from Perimeter Firewall Design: http://technet.microsoft.com/en-us/library/cc700828.aspx

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Online Colleges’ Scenario, Essay Example

Circumstances surrounding online colleges Online colleges are becoming more popular because they offer the same academic courses and in some cases are even cheaper than [...]

Pages: 2

Words: 616

Essay

Writing Research Papers: Chapters 5-6 Summaries, Essay Example

Chapter 5 Chapter 5 of Writing Research Papers is titled Gathering Data in the Library. The first few sections of this chapter deal with launching [...]

Pages: 3

Words: 803

Essay

Azores Culturally Sensitive Nursing, Essay Example

My nursing educational portfolio has enabled me to acquire new forms of knowledge and to experience a variety of situations where I am able to [...]

Pages: 3

Words: 707

Essay

Frankfurt School and Walter Benjamin Views in Mass Media, Essay Example

The implication of the Frankfurt School is a group of theorists from German-American background who were responsible for the development of a sturdy analysis in [...]

Pages: 5

Words: 1404

Essay

The Issue of Academic Integrity, Essay Example

Introduction Academic integrity is one of the leading concerns in the education sector. Some of the common forms of academic dishonesty include plagiarism, cheating, and [...]

Pages: 3

Words: 910

Essay

The Study of the Human Mind, Essay Example

Psychology is the study of the human mind. The human brain is the core of the thoughts that each individual forms, so it is important [...]

Pages: 2

Words: 555

Essay

Online Colleges’ Scenario, Essay Example

Circumstances surrounding online colleges Online colleges are becoming more popular because they offer the same academic courses and in some cases are even cheaper than [...]

Pages: 2

Words: 616

Essay

Writing Research Papers: Chapters 5-6 Summaries, Essay Example

Chapter 5 Chapter 5 of Writing Research Papers is titled Gathering Data in the Library. The first few sections of this chapter deal with launching [...]

Pages: 3

Words: 803

Essay

Azores Culturally Sensitive Nursing, Essay Example

My nursing educational portfolio has enabled me to acquire new forms of knowledge and to experience a variety of situations where I am able to [...]

Pages: 3

Words: 707

Essay

Frankfurt School and Walter Benjamin Views in Mass Media, Essay Example

The implication of the Frankfurt School is a group of theorists from German-American background who were responsible for the development of a sturdy analysis in [...]

Pages: 5

Words: 1404

Essay

The Issue of Academic Integrity, Essay Example

Introduction Academic integrity is one of the leading concerns in the education sector. Some of the common forms of academic dishonesty include plagiarism, cheating, and [...]

Pages: 3

Words: 910

Essay

The Study of the Human Mind, Essay Example

Psychology is the study of the human mind. The human brain is the core of the thoughts that each individual forms, so it is important [...]

Pages: 2

Words: 555

Essay

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!