This website uses cookies to ensure you have the best experience. Learn more

Network Security Essay

586 words - 3 pages

Nasario Birrueta
IT 200: Milestone Three

Network Security

Network security is one of the most important aspects of implementing a fully functional working network, downtime caused by poor network security can cause major economic loses. The two matters that need to be addressed is the User and Physical equipment.
Network security begins with the user. As such would implement a Network Use policy that the employee must sign and adhere to. The company network is to be used for work purposes only. All activity will be monitored and subjected to review by upper management. All users will use strong passwords that are at least 8 characters with upper case and at least one number and not to be shared not even to their immediate supervisors unless OK by IT and or upper management such as a VP or higher. All passwords will be monitored and subject to a monthly ...view middle of the document...

The wireless password will be at least WEP level with a strong password that is not to be shared among employees. All servers will have the latest software updates and patched accordingly to the application software recommendations. All devices on the network that have access to the internet and network will be physically placed behind a standalone physical firewall such as a Cisco ASA or SonicWALL firewall. All ports unless justified for opening will be closed. If a trading partner is connected to the Swagger network the same principles must apply a strong encryption between the two networks. Only upper management or sales will have VPN network access from the outside. No personal smartphone\laptop will be allowed to the company network unless approved by VP or higher.
Why such drastic measures, as I mentioned earlier network downtime or a data breach can cause major losses that could be devastating to any company. We can take the example of the Target data breach incident of 2013 where millions of customer’s credit and debit card information was stolen by a data breach. A simple task such as keeping a contractors password secured or a monthly password change could have kept this from ever happening. Not only did it cause millions in damage but target has to now invest millions in network security. Such a data breach at a smaller business such as Swagger distribution would be devastating that could result in the company going bankrupt.

1. Internet Security; Reference for Business, Encyclopedia of Business 2nd edition.
2. OpenDNS;
3. Target Data Breach happened because of a basic network segmentation error. Computerworld, Feb 6, 2014. Vijayan, Jaikumar.

Other Papers Like Network Security

Network Security Assessment Essay

3062 words - 13 pages  Network Security Assessment Prepared for: University of Maryland University College Prepared by: David Yurchak I. Vulnerability Assessments In the same way as other associations in the monetary administrations and different segments, agent merchants (firms) are the objective of digital assaults. The recurrence and complexity of these assaults are expanding, and individual intermediary merchants and the business, in

Network Security Administration Essay

823 words - 4 pages Unit 2. Assignment 1. Disk Redundancy Research 1. What does RAID stand for? RAID (originally redundant array of inexpensive disks, now commonly redundant array of independent disks) (unknown, 2015) 2. When would we use RAID? You would use RAID when you have a lot of important data that you are constantly changing and need to back up often. 3. Define the following types of RAID. a. RAID 0 RAID 0 consists of striping, without mirroring or Lab Cnaa

608 words - 3 pages Lab – Researching Network Security Threats Objectives Part 1: Explore the SANS Website Navigate to the SANS website and identify resources. Part 2: Identify Recent Network Security Threats Identify several recent network security threats using the SANS site. Identify sites beyond SANS that provide network security threat information. Part 3: Detail a Specific Network Security Threat Select and detail a specific recent network threat


269 words - 2 pages Ruben Quinones IT245 - Introduction to Network Management Colorado Technical University Online Professor: Dr. Shawn P. Murray Phase 1 Individual Project Due January 13, 2013 Table of Contents Section 1: Target Organization - Identifying the Network 3 Section 2: Diagramming the Network - Network Architecture 4 Section 3: Network Models 5 Section 4: Network Protocols and Agents 6 Section 5: Network Security 7 Section 6: Network


874 words - 4 pages Essay Designing a Security Strategy Geo-Probe Inc. (GPI) 20 years in business, a company with constant growth and success. GPI provides construction management, engineering design, programming and environmental planning, and other A-E projects in support of a, industry, different government and commercial clients. GPI has 300 employees and ten branch office locations. GPI has many computers and network device attach to their network like any

Computer Security In Education

330 words - 2 pages Maintaining internet security is of the utmost importance to higher education systems. The majority of universities’ administrative, financial, and clinical systems are available through a campus-wide network (Rasmussen, 2011). This means that highly confidential documents, such as student’s personal information, medical records, and much more are housed on campus servers. This information is vulnerable to security threats and puts the

Week 7 Project Paper

3453 words - 14 pages American Military University All about Network Security: Network Security Means Never Giving an Adversary a Chance. Anthony Portz 4199864 ISSC340 I001 SPR 14 Professor Alidad Jalinous June 16th, 2014 11:55 PM Introduction In this paper I will discuss network security and I will give a detailed description of the area while discussing different technologies that are involved. There are many ways to provide network security and a

Conduct a Network Traffic Analysis & Baseline Definition

606 words - 3 pages tools and protocol analyzers as an information systems security professional? Protocol capture tools and protocol analyzers are important tools for an information systems security professional. These utilities can be used to troubleshoot issues on the network. They can verify adherence to corporate policies, such as whether or not clear text privacy data is being sent on the network. They can be used to test security countermeasures and firewall

Ethical Hacking

1144 words - 5 pages reports findings, does not solve problems  Security test  More than an attempt to break in; also includes analyzing company’s security policy and procedures  Tester offers solutions to secure or protect the network Hands-On Ethical Hacking and Network Defense 3  Hackers  Access computer system or network without authorization  Breaks the law; can go to prison  Crackers  Break into systems to steal or destroy data

Face Detetction

1038 words - 5 pages scalable. The Peer-to-peer network are useful only for a network with fewer computers and are suitable for applications that do not require a high level of security as * There is a lack of security * The links in the network are not reliable * The system is not centralized, making the network administration difficult. * Network security has to be applied to individual computers on the network * Lack of centralized server to

Network Design

863 words - 4 pages location information for the devices. Provide a comprehensive list of devices including the quantity of each device needed. Justification Justify your determination that the selected network devices will meet the business needs. D. Network Security Devices Business Needs Assess the business needs. Proposed Network Security Devices Select network security devices to use to secure the network. Include setup and location information for

Related Essays

Network Security Essay

1846 words - 8 pages A 5 page paper on network security with 5 references NETWORK SECURITY Let us go back, twelve years. Where's Internet? Concentrated in the cables that connect the offices and cubicles of the American ministry of defense. Things were simple, and despite the sensitive nature of the data transferred no body talked about net work security, no body knew what was to follow. Some how a revolution was triggered, the information net burst out of its

Network Security Essay

966 words - 4 pages Network Security When it comes to networking and the security of networks, there are several different methods of protecting networks. Of these differing methods, some of them sound similar, but provide differing levels of security. In the following paragraphs, I will try to explain the differences between some of the methods used. • Explain the difference between historical and statistical logging. Logging is a simple way of keeping a

Network Security Essay

1817 words - 8 pages data between networks, and serving as a router when routing data to individual systems. Brouter functions as a filter that allows some data into the local network and redirects unknown data to the other network. 2) Enhance security using NAC/NAP methodologies Network access control (NAC) products entered the market a few years ago to fill this gap. A typical NAC solution provides an endpoint assessment of the computer and then enables access

Network Security And Management Essay

3952 words - 16 pages Network Security and Management Brandi Schoch CTU Online Introduction to Network Management IT245-1403A-09 Jennifer Gaddy August 11, 2014 Table of Contents Table of Contents 2 Identifying the Network 3 The Organization 3 Network Servers 3 Network Personnel 3 Diagramming the Network 5 Network Architecture 5 Speed and Distance 6 Access Method 6 Network Models 8 OSI Model 8 FCAPS Model 11 The Diagrams 13