Verified Document

Network Security Administrator, Approach Problem Securing A Case Study

¶ … Network Security Administrator, Approach Problem Securing a Central I would utilize a number of security measures to adequately secure a central computer network that is accessed by other branches and staff from remote physical location. The vast majority tends to work in conjunction with one another, and should not deny access to authorized users.

For all of the computers that are present in the primary, physical location in which the network is based out of, I would employ encryption measures. This sort of encryption is similar to that used by cellular devices (whether in the form of tablets or phones), which enables users to reduce the threat of unauthorized users from accessing their devices or the data within them (Stafford, 2010). However, it is worth noting that encryption would not be used on the computing devices in the network that are outside of this primary physical location.

One of the primary layers of defense that I would provide for the network as well would come in the form...

The ultimate boon of these routers is that they are able to engage in packet inspection (Merkow and Breithaupt, 2006, p. 269). Packet inspection is a fundamental component of security, because it enables the analysis of packets of incoming data -- some of which may be potentially threatening -- and generally examines both its contents and its header. The sort of packet inspection conducted by routers would operate as a good entry level defense for the entire network.
However, as anyone familiar with the conventional packet inspection is aware of, it is fairly brief and does not provide substantial inspection against sleeper cells and other forms of data that can present noxious results to a computer network after a significant amount of time. In fact, most point solutions that are accessible via conventional security appliances only retain data for a matter of…

Sources used in this document:
References

Merkow, M.S., Breithaupt, J. (2006). Information Security: Principles and Practices. Upper Saddle River: Pearson Prentice Hall.

Stafford, M. (2010). "Hackers crack cell phone encryption." Tech News Daily. Retrieved from http://www.technewsdaily.com/70-hackers-crack-cell-phone-encryption.html

Williams, P. "The Apache Software Foundation and its influence on data management." www.dataversity.com. Retrieved from http://www.dataversity.net/the-apache-software-foundation-and-its-influence-on-data-management/
Cite this Document:
Copy Bibliography Citation

Related Documents

Network Security
Words: 9364 Length: 25 Document Type: Term Paper

networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a better understanding of how to be able to reduce and manage risk personally at the workplace and at home. In today's world, the Computer has become a common feature in any organization anywhere

Information Security
Words: 3704 Length: 10 Document Type: Research Proposal

Security A broad definition of information security is given in ISO/IEC 17799 (2000) standard as: "The preservation of confidentiality (ensuring that information is accessible only to those authorized to have access), integrity (safeguarding the accuracy and completeness of information and processing methods), and availability (ensuring that authorized users have access to information and associated assets when required" (ISO/IEC 17799, 2000, p. viii). Prior to the computer and internet security emerged as we

System Security Every Organization Which
Words: 2884 Length: 9 Document Type: Thesis

Attacks on the system security include password theft, back doors and bugs, social engineering, protocol failures, authentication failures, Denial of Service attacks, active attacks, botnets, exponential attacks including worms and viruses, and information leakage. (Fortify Software Inc., 2008); (Fortify Software, n. d.) Servers are targets of security attacks due to the fact that servers contain valuable data and services. For instance, if a server contains personal information about employees, it

Information Technology IT Security Implementation
Words: 3195 Length: 10 Document Type: Term Paper

Computer IT Security Implementation Provide a summary of the actual development of your project. Because small corporations have to work under conditions of conflicting information technology in many instances, the requirement of maintaining these systems details entails far too many time-consuming processes that have to be carried out. This allows for the business to work in a logical order and promotes a more logical approach to the making of business decisions. The end

Database Security
Words: 2424 Length: 9 Document Type: Term Paper

Database Security The focus of this study is that of database security. Databases and database technology are such that play critical roles in the use of computers whether it be in business, electronic commerce, engineering, medicine, genetics, law, education or other such entities requiring the use of computer technology. A database is quite simply a collection of data that is related such as a database containing customer information, supplier information, employee

Nsm Alert Data/Standard Nsm There
Words: 543 Length: 2 Document Type: Essay

Forum Responses The assessment of alert data is spot-on and very straightforward -- an excellent and succinct description of the help they can provide. The concept that a "more powerful program" is simply "more intelligent" is also well-put, and has some interesting implications. For computer programs such as these, knowledge truly is power; the ability to analyze and react to data after its collection is precisely what makes generative tools and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now