Suitable Network Analysis Tool, Essay Example

Pages: 1

Words: 577

Essay

Introduction

This paper provides details of a suitable network analysis tool in order to examine the system network for potential vulnerabilities and threats.  This is examined within the context of systems forensics in order to allow the Company to make an informed decision on the most suitable application for the firm.  There are a range of products available on the market but the assessment moved towards the product ‘Tennable Nessus’ as being the most feature rich and supporting good client references that support the products quality and capability.  (Tenable Nessus, 2011)

A distributed network attack (DNA)  relates to a cyber-decryption  attack  over the entire system network.  This is an illegal attack where the hacker hopes to obtain personal information for profit motivated purposes. Information Technology has become the life-blood of virtually every organization. Most large business operations contain  Data Centre’s of expensive computer and communication systems (hardware) and important client information and programs (software). Together they provide the central back-bone of the organization and as such any threat to these systems can be extremely disruptive and costly to the business.   ..

Recovery Of Files

Tools like  Nessus provide a range of network vulnerability  tests and tracking  features.  The objective being to alert the system  administrator  to possible intrusions and potential threats.  The dynamics of the software is such that it does not rely upon one dedicated security system server but can operate  on all of the machines (nodes) throughout  the entire  network.  Important features of this incorporate the  potential of password decryption.  The actual DNA server itself resides at the very core of the network  allowing for supervision over the entire network framework.  This facilitates both management of the network and the ability to conduct target searches over perceived problem areas.  This reduces both cost and processing time.. (Access Data, 2011)

Internet Crime and particularly illegal entry into other computer systems i.e. hacking is deemed to be a Federal Offence in the USA and falls under the investigative jurisdiction of the Federal Bureau of Investigation (FBI).  Criminal computer hacking has been legally defined as any person who willingly and knowingly commits an act of cyber terrorism, credit card fraud, malicious vandalism, identity theft or other cyber-crime by hacking into a Corporate or Government system.  Such criminal acts are treated very seriously in the USA and will be subject to harsh penalties (Andress, M.  2011)

Network Security Audit

A Network security audit is a verification check concerning the points of vulnerability on a computer network where there may exist points of potential weaknesses for unauthorised access or entry to the computer network. It examines the control features of the system, levels of encryption, firewalls and hardware vulnerabilities. There are three broad areas of vulnerability on a computer network 1) Interception  2) Availability and  3) Access entry points.

What has made this a nightmare for the security manager is the fact that data can be easily copied onto small storage devices, laptop and portable computers.  This has intensified the need for improved security techniques over data and particularly that of data encryption. One method being the increased use of data encryption which uses algorithms and mathematical constructs to scramble the data into a non-readable format and can only be decrypted by having the relevant unlock key. (ISACA, 2011)

References

Access Data. (2011, 11 19). Decryption and Password Cracking Software. Retrieved from Access Data: http://accessdata.com/products/computer-forensics/decryption

Andress, M. (2011, 11 18). Network vulnerability assessment management. Retrieved from Network World: http://www.networkworld.com/reviews/2004/110804rev.html

ISACA. (2011, 11 18). Approach to auditing network security. Retrieved from ISACA: http://www.isaca.org/Journal/Past-Issues/2003/Volume-5/Pages/Approach-to-Auditing-Network-Security.aspx

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

The Relationship Between Reason and Faith, Essay Example

Faith and reason are concepts that modern Christians and non-Christians alike often have difficulty reconciling because they seem to come from opposite ends of the [...]

Pages: 1

Words: 656

Essay

Art Comes Alive: A Visit to the Museum, Essay Example

On September 2, 2011, I paid a visit to the Marietta-Cobb Museum of Art.  The two-story building had the classic look of a museum; tall [...]

Pages: 1

Words: 548

Essay

Diagnostic and Statistical Manual and Current Forensic Diagnosis, Essay Example

The 1952 publication of the Diagnostic and Statistical Manual: Mental Disorders(DSM-I) was a groundbreaking event for the profession of psychiatry in the United States and [...]

Pages: 1

Words: 457

Essay

The Case of Stan, Essay Example

Stan’s behavioral patterns, as reported in his Life Sketch, would suggest that he is suffering from an avoidant personality disorder that manifests itself through social [...]

Pages: 1

Words: 675

Essay

Flood Lessons Learned, Essay Example

Introduction Flooding has been a natural hazard in most parts of the world posing significant risk to commercial properties, homes and people. Hundreds thousands people [...]

Pages: 1

Words: 909

Essay

The Specific Implications for ECG, Essay Example

Disciplinary actions based on schools of thought The disciplinary actions were based on different schools of psychology as they represent important and major theories that [...]

Pages: 1

Words: 597

Essay

The Relationship Between Reason and Faith, Essay Example

Faith and reason are concepts that modern Christians and non-Christians alike often have difficulty reconciling because they seem to come from opposite ends of the [...]

Pages: 1

Words: 656

Essay

Art Comes Alive: A Visit to the Museum, Essay Example

On September 2, 2011, I paid a visit to the Marietta-Cobb Museum of Art.  The two-story building had the classic look of a museum; tall [...]

Pages: 1

Words: 548

Essay

Diagnostic and Statistical Manual and Current Forensic Diagnosis, Essay Example

The 1952 publication of the Diagnostic and Statistical Manual: Mental Disorders(DSM-I) was a groundbreaking event for the profession of psychiatry in the United States and [...]

Pages: 1

Words: 457

Essay

The Case of Stan, Essay Example

Stan’s behavioral patterns, as reported in his Life Sketch, would suggest that he is suffering from an avoidant personality disorder that manifests itself through social [...]

Pages: 1

Words: 675

Essay

Flood Lessons Learned, Essay Example

Introduction Flooding has been a natural hazard in most parts of the world posing significant risk to commercial properties, homes and people. Hundreds thousands people [...]

Pages: 1

Words: 909

Essay

The Specific Implications for ECG, Essay Example

Disciplinary actions based on schools of thought The disciplinary actions were based on different schools of psychology as they represent important and major theories that [...]

Pages: 1

Words: 597

Essay