Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Essay:
Computer and Network Security
Description of Information Environment of my Workplace
My workplace is Verizon Communication and I have been working for the company for more than 5 years. The Verizon Communication major business is to provide communication solutions for businesses and individuals through the wired and wireless communication devices. The company provides complete communication systems and devices for individual, small business, medium business and enterprises. However, the company sells bulk of its product online and the nature of its business requires the company to collect large volume of data and information from customer, employees, suppliers, shareholders, and other stakeholders. In carrying out its business objective, the company collects sensitive information from customer that include names, addresses, phone number, email address, and credit card number. In essence, the company uses the internet to collect the customer credit card information to process and complete the order. The data collected from the customer assists the company to create growth and opportunities because the data collected make the company to understand the top price to pay for particular product, and understand customer preference from specific geographic locations. The information collected assists the company to design its marketing plan.
Although, internet offers dynamic opportunities for our company because it assists in reaching customer located at wide geographic locations at low costs, however, our company faces some risks by using the internet technology to transact business because web and internet are highly vulnerable to various attacks.
In the United States, the DoS (Denial of Service), cyber espionage, point-of-sale intrusion and payment cards skimming are on the increase making the Verizon to face the threats on its information infrastructures. Over the years, Verizon is facing challenging to manage these threats based on the increase of attacks on the IT infrastructures in the United States.
2: Potential Threats to the Company Information Environment
Since the Verizon is using the internet to transact business, the company faces some inherent risks. For example, the hacker may capture customer username, password, and credit card information while transferring the data over the network. Some unscrupulous individual may also attempt to steal the company sensitive information using the sniffer program. Moreover, the hackers may attempt to steal workers' password using port scanner to penetrate the company network system. (Burr, Ferraiolo, & Waltermire, 2014).
The company is also susceptible to passive and active attacks. One of the passive attacks includes eavesdropping of the network traffic to gain access to the sensitive information supposed to be restricted from the view of outsiders. On the other hand, active attacks include altering information in transit between server and client, stealing of username and password and impersonate another user or alter website information. The nature of the business of Verizon Communication makes the company to face confidentiality risks that include eavesdropping, virus or Trojan horse attack and electronic fraud. In essence, hackers may use some malicious software to steal the company sensitive information. The company also faces the DoS (denial of service) attacks, which could prevent the company to carry out business operations on time.
By consequence, our company is susceptible to several attacks because the internet is opened to several vulnerability, which may make our company to lose several million of dollars if immediate action is not taken to implement effective security protocols to the company information systems. Moreover, Verizon Telecommunication outsources some of its IT functions to India in order to cut costs. In essence, the company faces some network and computer risks because the company will need to communicate to its contractors using the internet.
At this stage, the management is required to hire information security experts to conduct comprehensive security audit to the company information systems. The company management should also approve enough funds that will cover the costs of implementing security auditing, and the implementation will assist the company to identify the likely threats to the company information systems.
The table 1 provides the summary of the likely threats to the company information infrastructures that need urgent attention.
Legitimate user impersonation
Belief in invalid information
User data Modification
Infected the browser with Trojan horse
Message in transit modification
Loss of information
Compromise of the company machine
Vulnerabilty of the company to all other threats checksums
Eavesdropping of the company information on the net
Theft of the company information from the server
Theft of the client data
Configuration of the network
Steal information from the server
Loss of privacy
Loss of information
Encryption, Firewall, Intrusion Detection System, Intrusion Prevention System,
DoS (Denial of Service)
Flood the company machine with the bogus requests
Killing of the user threads
Filling up the memory or disk
DNS attacks on isolating machine
Preventing the company employee from getting work done
Difficult to prevent
Two: Implementation from a Technical Perspective
Since Verizon relies on the internet technology to conduct its business making the company to constantly seeking for the cutting-edge security solutions for its network and computer infrastructures. This paper suggests several security tools that the company can employ to enhance security of its network and information system. Some of the security tools are Data encryption standard, Antivirus Security Policy, Firewall, Cryptographic standards, Wireless Security systems, IPS (Intrusion detection System), and IPS (Intrusion Prevent System).
Firewall: Firewall is one of the effective security protocols that the company can use to protect its network infrastructure. Overview of the company network systems reveals that Verizon uses both the LAN (Local Area Network) as well as WAN (Wide Area Network) for its communication systems. The LAN and WAN assist the company to share files, and communicate across a specific or wider geographical regions. (Chadwick, 2012).
Meanwhile, Firewall technology is an effective security tool that the company can use to protect the data in transit by blocking an unauthorized access to the company network system. The Firewall consists of the filtering router application gate way as well as IP packet that delivers authentication objective. The firewall will offer security to the company network systems by disallowing unauthorized network to penetrate into the company network systems using strong authentication systems. (Young, 2008). The benefit of using the Firewall is to allow the company to transfer data in a confidential and secured manner. As being revealed in Fig 1, the Verizon can use firewall to disallow un-trusted network to penetrate its network systems.
Fig 1: Firewall
Cryptographic Standards: Cryptographic Standards are other security systems that the company can use to prevent unauthorized access to the company data. With the cryptographic standards, the company will be able to send encrypted data over the network system using the ciphertext. The encryption will change the data into nonsense text, which can only be decrypted by an authorized person in possession of a decryption key. (Stallings, 2011). The security strategy is to assist the company to transfer data over the network in a secured manner. The cryptographic standards will also assist the company to transfer sensitive information such as credit cards and other information without being intercepted by unauthorized individuals. The company can also use the AES (Advanced Encryption Standard) for the security of its data. The AES uses the combination of 128,192 and 256 key to develop the 128-bit encryption keys. Typically, the AES will deliver effective security for the company data.
Intrusion Detection System: The IDS (Intrusion Detection System) is another security system that the company can use to detect unauthorized access to the company network systems. Typically, the IDS will assist the company to identify and detect malware, and anomalies that attempt to exploit the customer data and the company network infrastructure. In essence, the security system is to enhance the confidentiality, availability and integrity of the company customer critical information. (Abdel-Aziz, 2009). As being revealed in the fig 2, the IDS will detect unauthorized access into the company workstations.
Fig 2: Intrusion Detection system
Intrusion Prevention System: As being revealed in Fig 3, the IPS (Intrusion Prevention System) will also prevent an unauthorized access to the company network systems in order to protect the customer information resources. Thus, the paper suggests that the Verizon Communication should use the combination of the Firewall, IDS and IPS to protect the company network resources. Moreover, the Verizon Communication should use the physical IDS such as security camera, biometric card, security guards, mantrap, and motion sensors to identify, gather and prevent unauthorized activities in the company information resources.
Fig 3: Intrusion Prevention System
Antivirus: The Verizon Communication should also implement antivirus security policy as a measure to counter virus attack. Typically, the company is required to install antivirus in all its computer system to prevent virus or worm attacks. It is critical for the company to use the fourth generation antivirus to prevent as well as identifying complex polymorphic virus in the company computer systems. Verizon can also use the Digital Immune System, which is a powerful antivirus developed by the IBM.
"Typically, Digital Immune System provides rapid response…[continue]
"Network And Computer Security" (2014, October 24) Retrieved October 21, 2016, from http://www.paperdue.com/essay/network-and-computer-security-193018
"Network And Computer Security" 24 October 2014. Web.21 October. 2016. <http://www.paperdue.com/essay/network-and-computer-security-193018>
"Network And Computer Security", 24 October 2014, Accessed.21 October. 2016, http://www.paperdue.com/essay/network-and-computer-security-193018
Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of
Computer Vulnerabilities Computer Security Vulnerabilities The extent of the problem This is not a small issue. The book "Analyzing Computer Security" lays out the following scenario: "First, 20 million U.S. smart phones stop working. Next follow outages in wireline telephone service, problems with air traffic control, disruptions to the New York Stock Exchange, and eventually severe loss of power on America's East Coast" (Pfleeger & Pfleeger, 2011, 3). The authors are talking about
Computer Security Over the last several years, cyber attacks have been continually rising. This is in response to emerging threats from nations such as China who are increasing their attacks on government and military installations. According to James Clapper (the Director of National Intelligence) these threats have become so severe that they are surpassing terrorism as the greatest challenge facing the nation. To fully understand what is occurring requires focusing on
Computer Security Information In the 21st century, information is the key to almost every organization's success. Data is the lifeblood of business -- the information one uses to be competitive and the information that spells success or failure in the marketplace. Data is so important that an entirely new security focus has arisen -- Computer Information Security. In an era in which we must choose which issues for focus, the issue
The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it
who have access to the network do not maintain proper security procedures and remain well-informed regarding potential risks and updated procedures and policies (Cobb, 2011; Whitman & Mattord, 2011; ICR, 2008). Any security policy must, after being properly designed and established, be communicated clearly and comprehensively to all relevant personnel, which in today's organizations typically means anyone with access to a company computer and/or the company network, or who
Computer Security In the past few years, viruses like "I Love You" and "SoBig" have generated much publicity and apprehension and highlighted problems of computer security. In the last month alone, experts estimate that 52 new viruses have spread through computer networks. In addition, the growing incidence of identity theft also illustrates the growing sophistication of hackers and their tools. This paper examines the main problems related to keeping the information on