Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Suitable Network Analysis Tool, Essay Example

Pages: 2

Words: 577

Essay

Introduction

This paper provides details of a suitable network analysis tool in order to examine the system network for potential vulnerabilities and threats.  This is examined within the context of systems forensics in order to allow the Company to make an informed decision on the most suitable application for the firm.  There are a range of products available on the market but the assessment moved towards the product ‘Tennable Nessus’ as being the most feature rich and supporting good client references that support the products quality and capability.  (Tenable Nessus, 2011)

A distributed network attack (DNA)  relates to a cyber-decryption  attack  over the entire system network.  This is an illegal attack where the hacker hopes to obtain personal information for profit motivated purposes. Information Technology has become the life-blood of virtually every organization. Most large business operations contain  Data Centre’s of expensive computer and communication systems (hardware) and important client information and programs (software). Together they provide the central back-bone of the organization and as such any threat to these systems can be extremely disruptive and costly to the business.   ..

Recovery Of Files

Tools like  Nessus provide a range of network vulnerability  tests and tracking  features.  The objective being to alert the system  administrator  to possible intrusions and potential threats.  The dynamics of the software is such that it does not rely upon one dedicated security system server but can operate  on all of the machines (nodes) throughout  the entire  network.  Important features of this incorporate the  potential of password decryption.  The actual DNA server itself resides at the very core of the network  allowing for supervision over the entire network framework.  This facilitates both management of the network and the ability to conduct target searches over perceived problem areas.  This reduces both cost and processing time.. (Access Data, 2011)

Internet Crime and particularly illegal entry into other computer systems i.e. hacking is deemed to be a Federal Offence in the USA and falls under the investigative jurisdiction of the Federal Bureau of Investigation (FBI).  Criminal computer hacking has been legally defined as any person who willingly and knowingly commits an act of cyber terrorism, credit card fraud, malicious vandalism, identity theft or other cyber-crime by hacking into a Corporate or Government system.  Such criminal acts are treated very seriously in the USA and will be subject to harsh penalties (Andress, M.  2011)

Network Security Audit

A Network security audit is a verification check concerning the points of vulnerability on a computer network where there may exist points of potential weaknesses for unauthorised access or entry to the computer network. It examines the control features of the system, levels of encryption, firewalls and hardware vulnerabilities. There are three broad areas of vulnerability on a computer network 1) Interception  2) Availability and  3) Access entry points.

What has made this a nightmare for the security manager is the fact that data can be easily copied onto small storage devices, laptop and portable computers.  This has intensified the need for improved security techniques over data and particularly that of data encryption. One method being the increased use of data encryption which uses algorithms and mathematical constructs to scramble the data into a non-readable format and can only be decrypted by having the relevant unlock key. (ISACA, 2011)

References

Access Data. (2011, 11 19). Decryption and Password Cracking Software. Retrieved from Access Data: http://accessdata.com/products/computer-forensics/decryption

Andress, M. (2011, 11 18). Network vulnerability assessment management. Retrieved from Network World: http://www.networkworld.com/reviews/2004/110804rev.html

ISACA. (2011, 11 18). Approach to auditing network security. Retrieved from ISACA: http://www.isaca.org/Journal/Past-Issues/2003/Volume-5/Pages/Approach-to-Auditing-Network-Security.aspx

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Effect of Reducing Caffeine Intake on Birth Weight and Length of Gestation, Essay Example

Background to the paper Recent research has shown scientific evidence that prenatal nutrition is associated with the health of the pregnant women as well as [...]

Pages: 13

Words: 3553

Essay

People and Environment, Essay Example

Would people have changed if they were living in an extremely harsh and severe environment? The changes might have been physical or mental or both [...]

Pages: 4

Words: 1175

Essay

Islamic Curriculum in AYA School, Essay Example

Islamic Curriculum The United States of America is well-known as the country of many freedoms. For this reason, many people in other countries aspire to [...]

Pages: 5

Words: 1481

Essay

A Life Between the Lines of Arabic Literature, Essay Example

What is the significance of the theme of colonization in the novel Season Of Migration To The North? The novel Season of Migration to the [...]

Pages: 6

Words: 1540

Essay

Out of Albania: From Crisis Migration to Social Inclusion in Italy, Essay Example

Personal Growth Project Even though people in the world become closer and connected to each other and even though there are several ways to easily [...]

Pages: 6

Words: 1581

Essay

Alibaba.com, Essay Example

Introduction Open Sesame, a well-known line that has been engrained in pop culture references and vocabulary since the tale of those memorable words. Even more [...]

Pages: 9

Words: 2380

Essay

Effect of Reducing Caffeine Intake on Birth Weight and Length of Gestation, Essay Example

Background to the paper Recent research has shown scientific evidence that prenatal nutrition is associated with the health of the pregnant women as well as [...]

Pages: 13

Words: 3553

Essay

People and Environment, Essay Example

Would people have changed if they were living in an extremely harsh and severe environment? The changes might have been physical or mental or both [...]

Pages: 4

Words: 1175

Essay

Islamic Curriculum in AYA School, Essay Example

Islamic Curriculum The United States of America is well-known as the country of many freedoms. For this reason, many people in other countries aspire to [...]

Pages: 5

Words: 1481

Essay

A Life Between the Lines of Arabic Literature, Essay Example

What is the significance of the theme of colonization in the novel Season Of Migration To The North? The novel Season of Migration to the [...]

Pages: 6

Words: 1540

Essay

Out of Albania: From Crisis Migration to Social Inclusion in Italy, Essay Example

Personal Growth Project Even though people in the world become closer and connected to each other and even though there are several ways to easily [...]

Pages: 6

Words: 1581

Essay

Alibaba.com, Essay Example

Introduction Open Sesame, a well-known line that has been engrained in pop culture references and vocabulary since the tale of those memorable words. Even more [...]

Pages: 9

Words: 2380

Essay

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!