Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Security Issues and Communicate to Staff, Essay Example

Pages: 1

Words: 357

Essay

There are numerous reasons why a good security system has to be more than that of a simple firewall.  The following explains how ABC Company needs to be concerned about additional preventative measures for its new website.

Malicious logic issues –   This sort of cyber-attack is created by a person who assumes the identity of a legitimate user of the system.  This in turn violates the company security policy by the intent of malicious logic that is aimed at damaging the integrity of the system. This renders traditional access controls as ineffective. Examples of this are Viruses, Trojans and Worms.  The system needs additional protection via anti-virus screening software such as that provided by Norton or MacAfee. (Bishop, M. 2002)

Intrusion Detection –  This represents software that provides a holistic approach towards managing the safety  of the computer network and website.  It encompasses both the firewall and other components, as illustrated in the diagram to the right.  The IDS system  monitors all inbound and outbound traffic on the system and reports any suspicious activity or trends.   This includes those type of patterns that may indicate the someone is either trying to compromise or intrude into the system. (Marchette, D.J. 2001)

Intrusion Detection

Network Perimeter Security –  This essentially relates to the protection of the network by defence strength in depth.  It defines the boundary that exists between that of private and locally managed computer network systems.  This involves defining the perimeter of your computer systems and providing well defined security zones. (Buecker, A. 2008).  The example to the right shows an example of a perimeter network designed by Microsoft Corporation. (Microsoft, 2011)

Network Perimeter Security

References

Buecker, P. S. (2008). Understanding Perimeter Security. Austin, Texas: IBM.

Bishop, M. (2002). Computer Security : Art and Science. In M. Bishop, Computer Security : Art and Science (p. 461). New York : Addison Wesley.

Marchette, D. (2001). Computer Intrusion detection and network monitoring. London : Springer.

Microsoft. (2011, 10 27). Microsoft Technet. Retrieved from Perimeter Firewall Design: http://technet.microsoft.com/en-us/library/cc700828.aspx

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Research Methodology, Essay Example

Sharing and exchange information is a relatively new phenomenon in the field of information science. Which the best methods could be applied for data collection [...]

Pages: 1

Words: 3371

Essay

Facilitation and Counseling Techniques, Essay Example

In the field of psychology, it is common for people to want and need counselling, and this can be for various reasons, depending on the [...]

Pages: 1

Words: 1142

Essay

Stock Holder Valuation, Essay Example

Business managements could develop stock holder campaign among employees through giving them good choices of programs which they could enroll to. Allowing them to see [...]

Pages: 1

Words: 351

Essay

Information Theory and Design, Essay Example

Individuals’ behavior for information sharing and exchanging will be guided by personal characteristics and the environment they are in. and there are many information behavior [...]

Pages: 1

Words: 2429

Essay

Information and Behavior, Essay Example

Summarize collaborative information behavior (CIB) studies conducted in different disciplines, such as health science, technology, and business. Discuss the differences and similarities among them? What [...]

Pages: 1

Words: 3230

Essay

Elisenda and the Angel, Essay Example

One of the most important measures of human beings can be found in their values. People behave according to what is important to them and [...]

Pages: 1

Words: 816

Essay

Research Methodology, Essay Example

Sharing and exchange information is a relatively new phenomenon in the field of information science. Which the best methods could be applied for data collection [...]

Pages: 1

Words: 3371

Essay

Facilitation and Counseling Techniques, Essay Example

In the field of psychology, it is common for people to want and need counselling, and this can be for various reasons, depending on the [...]

Pages: 1

Words: 1142

Essay

Stock Holder Valuation, Essay Example

Business managements could develop stock holder campaign among employees through giving them good choices of programs which they could enroll to. Allowing them to see [...]

Pages: 1

Words: 351

Essay

Information Theory and Design, Essay Example

Individuals’ behavior for information sharing and exchanging will be guided by personal characteristics and the environment they are in. and there are many information behavior [...]

Pages: 1

Words: 2429

Essay

Information and Behavior, Essay Example

Summarize collaborative information behavior (CIB) studies conducted in different disciplines, such as health science, technology, and business. Discuss the differences and similarities among them? What [...]

Pages: 1

Words: 3230

Essay

Elisenda and the Angel, Essay Example

One of the most important measures of human beings can be found in their values. People behave according to what is important to them and [...]

Pages: 1

Words: 816

Essay

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!