Friday, May 17, 2019

Internet connections Essay

The security implications of sharing net profit connections between FTD employees and stuff must be strong in order to assure safety for both(prenominal) the clients and the employees. The main security issue such as data access must be use in such a way that the privilege given to the FTD employees which is controlled and manipulated. Controlling the web-browsing habit such as browsing illegal or unwanted web sites need also to be controlled, hence providing drug user access to email, web sites using password and encryptions is essential.Keeping off the malicious users from accessing valuable culture and opposite external schooling that can be employ against the FTD employees and the authorities needs to be fritter awayn chthonic consideration. Sending emails and other attachments must be allowed according to hierarchy of access permissions. Unauthorized access to medium data must be prevented by implementing policies and procedures to prevent, detect, contain, and correc t security violations. Such prevention needs to be focused on Physical Security, Data Communications Security and Operating dodges security.Tools that can be used to enhance the security of computers connected to a network argon called a firewall. When selecting firewalls, one must take into account such as easy installation and configuration, report of the attack by identifying time, location and oddball of attack, good maintenance and monitoring requirements, etc. The firewalls that should be used in the main site are Packet Filtering, Stateful Packet Inspection, Application-Level Proxy and Network Address Translation (NAT). To have a perfectly operable operation and conduct the approximately proper ethical business functions is the first priority for most companies and businesses.The most critical issue related with IT is IT security where the objective is to take effective measures to decrease the threats exist today in IT related business such as e-commerce. Security and r isk management are tightly coupled with quality management and Security measures should be implemented based on risk analytic thinking and in harmony with Quality structures, processes and checklists. 5. Today, most companies prefer electronic in resileation over traditional shipway of storing and manipulation of information.Data are stored in huge database and process using different front-end softwares form anywhere in the world. Security is the protection of information, systems and services against disasters, mistakes and manipulation so that the likelihood and have-to doe with of security incidents is minimized. 5. IT security is made up of three main categories and they are Confidentiality, truth and Availability. Confidentiality is when confederacy or an organization has sensitive information and does non want to disclose such information to anyone outside the company.Integrity is when companies want to update the system to adapt to future needs. As for availability, it is when a business implements a system it needs to make sure the system is up and running when needed. A threat is a endangerment which could affect the security (confidentiality, integrity, availability) of assets, leading to a potential loss or damage. 5. Threats such as customers information can be disclosed which can affect the credibility of any company companies information can be hacked by illegally, etc.It is often impossible or very onerous to know if you are under attack and from whom and attackers sophistication has increased enormously in the last 5-10 years. 5 new(prenominal) threats such as virus development have increased at an alarming rate. However, the most customary cause of security problems are as stated Human Error 52%, Dishonest peck 10%, Technical Sabotage 10%, Fire 15%, Water 10% and Terrorism 3% and many computer crimes Money theft 44%, Damage of software 16%, Theft of information 16%, Alteration of data 12%, Theft of services 10%, Trespass 2%. 5 . thither are many ways to improve the correct securities such as protecting data and information using different sophisticated firewall software, ascertaining threats and its impact in order to be protected form it, calculating risk and deciding how to eradicate such risk. There are two basic ways to improve security and they are Bottom Up and Top Down. Bottom Up approach is not that precise but in order to implement such approach it is advisable to properly understand company policies, network topology and companies operating procedure.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.