This website uses cookies to ensure you have the best experience. Learn more

How To Secure Your Systems Essay

1690 words - 7 pages

How to Secure Your Systems
Networking Security Fundamentals
CIS 333
July 28, 2012

How to Secure Your Systems

When we think about technology we think of all the capabilities it gives us and also the headaches it brings. In today's technological world there are many vulnerabilities to the computer networks that we have. If there is a malicious attacker exposes these vulnerabilities can affect the company in many ways. We know that your business could be interrupted causing you thousands of dollars in damage. Not only could you lose business by your network going down, but you can also lose consumer confidence, and ensure the possible penalties imposed on you by the government for not ...view middle of the document...

It is a solution or system that if managed and configured properly will assist in the fortification of your network by telling you if someone has attempted to gain access or has gained access to your network. (Kim & Solomon; 2012).
There are two basic types DMZ’s, which are back to back and three homed. The back-to-back is placed between two firewalls, which are either program or hardware setups used to block unwanted traffic. The three-homed DMZ is one that has three separate networks. One network goes to the public network, the other goes to your private network, and the third is the one that contains those machines that are running the applications or services that you have in your DMZ. Each company can configure their DMZ with whatever services they want, so although they might be the same basic type they will still be different. One can also have multiple zones within their DMZ so that it adds protection in case one of their zones gets intruded and brought down, the others will still be operational. One can have separate levels of security added to those zones so that the different applications can be grouped into different security levels. Other solutions can be added to your DMZ, some of those are Honeypots, and IDS’s. Honeypots are programs designed to invite attackers to gain access to it so that the attacker’s methods and tools used are recorded. Another solution is an IDS’s, which is a monitor or a sensor that can be placed at various parts of your network so that you can monitor the traffic that is going through that particular fragment.
Mitigating program security vulnerabilities has its challenges because programs are instigated in a variety of languages and contain serious vulnerabilities which might be demoralized to cause security breaches. These vulnerabilities have been exploited in real life and caused damages to related stakeholders such as program users. As many security vulnerabilities belong to program code, many techniques have been applied to mitigate these vulnerabilities before program deployment. Unfortunately, there is not wide-ranging comparative analysis of different vulnerability alleviation works. As a result, there exists an obscure mapping between the techniques, the addressed vulnerability, and the boundaries of different methodologies. There are three approaches that can be employed to mitigate the most common program security vulnerabilities: secure programming, program security vulnerability alleviation approaches and challenges as well as their key characteristics and boundaries.
When you think of just a few of these attacks where are they mainly coming from and how can we try to prevent this potential malicious attacks from happening. I know that we have already discussed a few of them but here are more. These threats can come in as the following format, email viruses, website viruses, e-mail spam and malware, release of PPI or confidential data and hackers. Ways to prevent this for happening is if...

Other Papers Like How to Secure Your Systems

How To Distress Your Damaged Jeans

468 words - 2 pages Keressar James Speech 102 Speech #1 Professor Brathwaite Keeping the old, Making it new General Topic: Keeping the old and making it new General Purpose: To demonstrate to my audience how to create a new look for the new season. Specific Purpose: At the end of my speech the audience will be able to keep and reuse outdated clothes as the seasons change and this project is one of the best ways in which to do that. Timed Length: 3-4 minutes

How To Get Along With Your Col

803 words - 4 pages How To Get Along With Your CollegeRoommate College is a very difficult time in your life and one of the most difficult things is adjusting to having a roommate and sharing your space with someone else. Although it helps to know the person, that is not always true. There are a lot of things that you must remember and do to make this adjustment more easy and good for both you and your roommate. The following are a list of things to help

How to Research Your Family Tree

973 words - 4 pages How to Research Your Family tree Do you ever wonder who your ancestors were? Do you ever wonder if you're related to anyone famous in history? I would guess that at some point you have pondered these questions. I know that I have. But how do you find out who your ancestors were and what they were like? Genealogy is the study of your ancestors and their descendants. In the last few years I havebecome very interested in genealogy and want to

How to Give Away Your Faith

1753 words - 8 pages The book “How to Give Away Your Faith” is written about evangelism which can be a very difficult sell to many people. The reading of it is most probably going to uncover feelings of inadequacy, fear, and a sense of failure. Paul Little’s book over comes these stereotypes in a very easy to read and helpful style. Little was known by many as a dynamic evangelist whose stories and natural humor trained a generation on how to “give away” their faith

How To Shoot Some Adrenaline Into Your Soul

458 words - 2 pages How to shoot some adrenaline into your soul Looking unto Jesus the author and finisher of our faith; who for the joy that was set before him endured the cross, despising the shame, and is set down at the right hand of the throne of God. For consider him that endured such contradiction of sinners against himself, lest ye be wearied and faint in your minds. (Heb 12:2-3 KJV) What do you do when you get tired in the race of life? What do you

Erp Systems: What Advantage They Bring to a Company and How to Implement Them

1603 words - 7 pages turnover of any industry. So it is critical for them to get new staff and running it on their systems quickly. For this reason central is finding a system that is highly intuitive and easy to use. It is important that a retailer tries a demo of the system himself and to evaluate how easy it is. Another important step for the selection of a system is to assess the support and the upgrades related to the system that the retailer wants to buy. It

As an Ib Student, How Has Your Learning of Literature and Science Contributed to Your Understanding of Individuals and Societies?

1339 words - 6 pages Question 9 Sarah Bollen TOK Word count: 1263 As an IB student, how has your learning of literature and science contributed to your understanding of individuals and societies? During the last year I have been taught not only in the different ways of knowing but also how to evaluate different types of literature, which has helped me to understand different societies and individuals. In the following I will explain, with the help of the

How Are Identity Thieves Operating to Get Your Identity and What Can They Do with It?

879 words - 4 pages other words: when someone uses other one’s identity to take advantage of it without any liability on his or her name. On the other hand there are various ways in which people can access to your valuable information, sometimes they are simple techniques and other times more sophisticated methods. The statistics on identity thefts, and also what is being done to prevent it, are two significant factors to be analyzed and see how secure we are now days

How You Would Use Ict to Support Your Own Proffesional Development

1069 words - 5 pages 1. Give a detailed account of how you would use ICT to support your own professional development and that of children and young people. The growth and incorporation of ICT developments in the classroom offers a positive dimension for the teacher and teaching support staff and also provides interesting approaches towards learning and increased accessibility it encourages across the curriculum. Also a focus on student led learning, through the

Using An Organisation Of Your Choice Write A Report That Explains How The Company Seeks To Deliver Customer Value

2077 words - 9 pages Using an organisation of your choice write a report that explains how the company seeks to deliver customer value. This report will be explaining how Tesco Plc seeks to deliver customer value, through objectives and strategies they have in place to try and deliver customer value, and also improving the relationship between them and the customer. Tesco was founded in 1919 when Jack Cohen began to sell groceries from a stall in East London

How to Save Your Job

737 words - 3 pages projecting your readiness to be CEO and conveying your loyalty and support for the current regime. There is a fine line between an assertive leader and a cocky candidate. A CEO candidate also can do everything right but not get the job because the CEO never intended to promote him or her in the first place. I saw this happen when I was asked to coach one CFO for the top job. The CEO had told the CFO that he would become the new chief executive if

Related Essays

How To Maintain Your Computer Essay

526 words - 3 pages Properly Maintain Your Computer 1 How to Properly Maintain Your Computer Properly Maintain Your Computer 2 With technology on the rise

How To Annoy Your Parents Essay

549 words - 3 pages Essay Brainstorm - How to Annoy Your Parents After you have listed all the things you can think of, you need to see if any of them fit together. I like to circle them in colors, then think of how they are related. bug them after a long day at work wear your mom’s shoes or clothes leave the milk out don’t clean your room leave a mess when you’re done in the kithchen get a tattoo without permission take things without asking leave the toilet seat

How To Breastfeed Your Baby Essay

1100 words - 5 pages HOW TO BREASTFEED YOUR BABY [pic] 1. Position yourself properly It's easiest to get started breastfeeding the first few times if you are sitting up. • Sit up in bed, in a comfortable armchair, or in a rocking chair. • Pillows are a must: Use them behind your back, under your elbow, and on your lap to support the baby. • Use a footstool to bring your knees up or use pillows under your knees if you are sitting up in bed

How To Raise Your Child Essay

546 words - 3 pages How to raise your child Raising a child demands time and effort and being a good parent can be very complicated. There is no wrong or right when raising a child, but there sure are consequences. At home, it is often the parents who are in control and it is of course important what they decide, but what's more important for the child's health and well-being is how they decide it. A child's behavior depends a lot on how it is raised. Do the