Preview

Problems in Network Security

Good Essays
Open Document
Open Document
838 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Problems in Network Security
Problems in Network Security

Problems in Network Security
Calvin C. Tippit
CM107-59
Problems in Network Security

Outline

I. Introduction a. Information security vulnerabilities
b. More training is needed for employees working in the Network Security field to prevent common mistakes from happening.
II. Mobile Insecurities a. Mobile devices being intruded by cybercriminals.
b. The importance of Anit-Virus softwares and system updates.

III. Privacy and Security Issues in Social Networking a. Security lapses on social networks b. The problems plaguing social network security and privacy issues

As many businesses try to make their companies thrive by connecting their systems to the internet, some companies may become very skeptical about this. With virtually everyone in the world being connected to some type of network, having all of company data linked together can cause a very serious problem by one user’s mistake or problem. In many instances, the potential for data loss or a small security breach increases when creating a network. This can happen over large or small networks, but when it comes to how important security is, the size is totally insignificant. The sole purpose in network security is to prevent any loss of data by mismanaging it.
While companies may install all of the latest firewalls, intrusion prevention systems, and anti-virus software within their networks, it will still be nearly impossible to block every potential security threat that could potentially harm a small business. On a daily basis the employees are the first line of defense, the training of employees on the importance of network security is crucial, as well as the things they can do to prevent security breaches from happening. While security breaches and malware are not as widespread on handheld devices such as smartphones and tablets, there still needs to be a “mobile threat prevention strategy” in place (James, 2009). With so



References: Collins, B. (2008). Privacy and Security Issues in Social Networking. Retrieved from http://www.fastcompany.com/1030397/privacy-and-security-issues-social-networking. Anthony, J. (2009). Overcoming Mobile Insecurities. Retrieved from http://www.wirelessweek.com/Articles/2009/04/Overcoming-Mobile-Insecurities/.

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Corporation Tech will face many security risks with their current network. The user domain is the single most vulnerable part of any network and as such poses the most obvious security risk. To mitigate risks involving the users is to implement policies and training to educate the user on proper use and security best practices. By educating the user on security practices such as secure passwords, safe web surfing, and securing their workstations, many potential attacks can be avoided. Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised.…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    c. Encrypt the hard drives of company computers, laptops and mobile device to prevent the loss of sensitive data…

    • 299 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Tags: sec402, sec 402, Cyber Security, sec 402 Cyber Security, strayer university, sec 402 strayer, sec 402 complete class, sec402 entire, sec 402 complete, sec 402 case study 1, case study, assignment, complete class, sec 402 Case Study 1 - The Critical Need for Information Security, sec 402 Assignment 1 - Developing the Corporate Strategy for Information Security, sec 402 Case Study 2 - Developing the Forensics, Continuity, Incident Management, and Security Training, sec402 Assignment 2 - Implementing Network and Personnel Security Measures, The Rookie Chief Information Security Officer, sec402 term paper The Rookie Chief Information Security Officer, sec 402 mid, sec402 midterm exam, sec 402 final, sec402 final exam, testbank, quiz bank…

    • 265 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Network Security

    • 581 Words
    • 3 Pages

    1. A(n) hub____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.…

    • 581 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Since then companies began to become more aware of the problems associated with computer and security. Only in 2013, the Utah government reported twenty-million cyber-attacks each day, so it suggests that there are trillions of cyber-attacks worldwide (Millions of Cyber Attacks Each Day, 2015). So, the steps that companies take are an organizational framework with new operations towards employee education, organizational policies, IT and network advisors to limit access as a job-related function (Trim & Yam-Im, 2010). Meaning education combined with limiting the number of people having full access to everything decreases the chance of a cyber-attack and with the security of an IT specialist proactively monitoring the system. For example, Lockheed-Martin's cyber-kill chain that stops the stages of malware by reconnaissance, weaponization, delivery, exploit, installation, command & control, and actions (Mattern, Felker, Borum, & Bamford, 2014).…

    • 750 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Gregg Shafel Case Summary

    • 422 Words
    • 2 Pages

    Technology innovation and global competition are two essential aspects of modern business, as a result companies invest a great deal in these areas (LeClair, 2000). It is imperative for senior management, like Steinhafel and his senior managers, to identify the information important to their business and which information is most valuable so that they can develop an IT infrastructure to protect those assets and then educate, inform, and train employees in a way that fosters a culture in which security is a priority (Dutta, 2002). With planning, innovation, and training a company can face the ever changing threats of the cyber world with increased confidence and thereby gain the confidence and business of their customers (Dutta,…

    • 422 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Businesses need to ensure the secure storage of company files and the guaranteed privacy of employee information. With the increased use and demand for network computing, information security has become a high priority. With all the ways in which someone can gain access to private and confidential information, the previous safe measures need to be enhanced and improved (Yaoxue Zhang; Laurenc T. Yang; Yuezhi Zhou; Wenyuan Kuang. 2010). For example, employee and company files are…

    • 962 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Snowden's Case Summary

    • 520 Words
    • 3 Pages

    Some of these changes were costly and out of the realm of possibility for small businesses. However, many of the changes all business can easily apply to their organizations. With a defense in depth approach against insider threats, businesses can apply measures to protect their data and…

    • 520 Words
    • 3 Pages
    Good Essays