Preview

Assignment 2: Business Impact Analysis

Good Essays
Open Document
Open Document
349 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Assignment 2: Business Impact Analysis
Security threats in a network environment are far much detrimental and can always paralyze operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).
To secure the network and ensure a degree of protection from external intrusion, the first step is to ensure it is a private network and each host in the different remote locations is part of the private network; this minimizes the intrusion from public networks. Through the use of firewalls in the central computer network enforces authentication of all users in the network thus minimizing internal and external unauthorised access (Stallings, 2007).
To secure against attacks from the internet and the external networks the use of a strong antivirus software and internet security software in all the workstations, hosts and servers is important. In addition to this it is important to have a network security policy that will clearly stipulate the use of the Library property and also provide the guidelines on using personal resources in the library network. Since the network is private a white list of all authorised wireless networks should be maintained to avoid unauthorised access from external wireless networks. It is also important to ensure that all hardware and software is in secure zones and environments to avoid physical damage (Stallings, 2007).
These are basic steps towards securing the central database from attacks such as denial of service that is mainly caused by unauthorised access. The strategy is simple and less costly thus cannot cause strain on the budget.
Kaeo, M. (1999). Designing network security.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    When configuring windows networking, two major approaches are valid to secure all the network resources, the workgroup approach and the Domain approach. The workgroup approach is simply to create a windows peer-to-peer network with a decentralized security system. This workgroup security approach…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Between every network and the outside host of threats there is a first line of defense. For almost every network this will be a firewall. A firewall can be both hardware and software and is usually a combination of the two. A firewall creates a barrier between networks. Any outside computer or client must pass through the firewall to access the network or its resources. Only a computer or system that has proper access can easily access a network protected by a properly configured firewall. Though it is not infallible, a firewall is the first and perhaps best means of security…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    If you have a more than one computer connects in home. It is important to protect every computer. You should have a hardware firewall (such as router) to protect your network, but you should also use software firewall on each computer to prevent the spread of virus your network.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Business Impact Analysis

    • 1120 Words
    • 5 Pages

    The purpose of this essay paper is to elaborate on the Business Impact Analysis (BIA), which is designed to assist management in determining which functions are critical to the continued operation of the organization. The organization that Team A selected is the City of Hollister Police Department. Team member Don Magnuson is currently a sworn Police Officer for the department and executes his duties with the dedication to protect and serve the communities in which he patrols. Team A will introduce to you the Hollister Police Department, and demonstrate how the management operates within the guidelines and assistance of the Business Impact Analysis.…

    • 1120 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Business Impact Analysis

    • 1075 Words
    • 5 Pages

    In the process of discussing their interdependence, (James F. Broder, 2012), keep in mind the business. The key processes all occur in every business functional areas. The main point of any business about a business disruption is the financial impacts and operational impacts. The operational impacts will address the nonmonetary impacts which will include technology, processes and people while the financial impacts will specifically focus on the monetary impacts and look at how the…

    • 1075 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Business Impact Analysis

    • 1018 Words
    • 5 Pages

    • If not performed in а timely mаnner, how much finаnciаl loss would the foundаtion suffer?…

    • 1018 Words
    • 5 Pages
    Better Essays
  • Better Essays

    4. What is the definition of Recovery Time Objective (RTO)? Why is this important to define in an IT Security Policy Definition as part of the Business Impact Analysis (BIA) or Business Continuity Plan (BCP)?…

    • 790 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    WIMAX WHITE PAPER

    • 2248 Words
    • 7 Pages

    No network is 100 % secure. The idea that someone is possibly able to hack your network and use your credit card information or steal important data from a bank or a company cannot be acceptable. Therefore, the internet network and its security are considered as the most concerned issue in the telecommunication world.…

    • 2248 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    As a Network Administrator student I would have suggested that they would also include VPN (Virtual Private Network) for they would have a much better secure network and database.…

    • 363 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is 305 Week 3 Lab

    • 806 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 806 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nids

    • 2445 Words
    • 10 Pages

    In today’s environment we need to contact each other through networks. Most of the devices or networks are interconnect to other devices or networks. As a result of this connection you are able to share your files, documents, etc. but when you are sharing you need to connect to a network and to the internet. When you connect to the internet you are taking a risk, cause your sharing files or documents may visible to others or intruders can steel your important files without a leaving a single mark. As a result of this Internet Security was introduced to protect your system from intruders.…

    • 2445 Words
    • 10 Pages
    Powerful Essays