Preview

Assignment 2: Business Impact Analysis

Good Essays
Open Document
Open Document
349 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Assignment 2: Business Impact Analysis
Security threats in a network environment are far much detrimental and can always paralyze operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).
To secure the network and ensure a degree of protection from external intrusion, the first step is to ensure it is a private network and each host in the different remote locations is part of the private network; this minimizes the intrusion from public networks. Through the use of firewalls in the central computer network enforces authentication of all users in the network thus minimizing internal and external unauthorised access (Stallings, 2007).
To secure against attacks from the internet and the external networks the use of a strong antivirus software and internet security software in all the workstations, hosts and servers is important. In addition to this it is important to have a network security policy that will clearly stipulate the use of the Library property and also provide the guidelines on using personal resources in the library network. Since the network is private a white list of all authorised wireless networks should be maintained to avoid unauthorised access from external wireless networks. It is also important to ensure that all hardware and software is in secure zones and environments to avoid physical damage (Stallings, 2007).
These are basic steps towards securing the central database from attacks such as denial of service that is mainly caused by unauthorised access. The strategy is simple and less costly thus cannot cause strain on the budget.
Kaeo, M. (1999). Designing network security.

You May Also Find These Documents Helpful

  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Introduction Global Finance, Inc. (GFI) is a hypothetical company, which has grown rapidly over the past year. GFI has invested in its network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its overall network security posture has not kept up with the company growth. The trusted computing base (TCB) internal network within the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems that are vital to the company’s operations that also affect the overall financial situation. The most vital application servers is the company is their Oracle database and email system. GFI cannot afford system or network outages, as its cash flow and financial systems heavily depend on the network stability and availability. GFI has recently experienced multiple network attacks resulting in a total estimated loss at more than $1,000,000.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Controlled management of network devices, and user accounts: Having the computers and other network devices managed by authentication through a server will keep unauthorized devices from accessing the network, and ensure the overall integrity of the network as a whole.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Physical Security

    • 724 Words
    • 3 Pages

    After reviewing several articles on the Internet, I chose the topic of physical security and an article entitled “Lock IT Down: Don 't overlook physical security on your network”. This particular article peaked my interest because it addresses the various aspects of physical security that can often be overlooked in a world that is so highly focused on threats of cyberterrorism, virus attacks, hacking, application and network security. What caught my attention was the line, “If the server is sitting in the middle of your office where anyone can get to it, you might as well not have any security at all.” (Bogue, 2003)…

    • 724 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Business Impact Analysis

    • 1120 Words
    • 5 Pages

    Abstract The purpose of this essay paper is to elaborate on the Business Impact Analysis (BIA), which is designed to assist management in determining which functions are critical to the continued operation of the organization. The organization that Team A selected is the City of Hollister Police Department. Team member Don Magnuson is currently a sworn Police Officer for the department and executes his duties with the dedication to protect and serve the communities in which he patrols. Team A will introduce to you the Hollister Police Department, and demonstrate how the management operates within the guidelines and assistance of the Business Impact Analysis.…

    • 1120 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Unit 7 Lab 7: Performing a Business Impact Analysis for an IT Infrastructure IS 3110…

    • 790 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Business Impact Analysis

    • 1075 Words
    • 5 Pages

    In the process of discussing their interdependence, (James F. Broder, 2012), keep in mind the business. The key processes all occur in every business functional areas. The main point of any business about a business disruption is the financial impacts and operational impacts. The operational impacts will address the nonmonetary impacts which will include technology, processes and people while the financial impacts will specifically focus on the monetary impacts and look at how the…

    • 1075 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Global Finance

    • 3344 Words
    • 11 Pages

    Global Finance, Inc. is an international organization with expansions in many states. In every state, the company has a number of sites and each site has several workers and customers. Offices are interconnected to each other and to the host organization. As an international organization, Global Finance, Inc. requires a robust network that can support its daily operations, a secure network system and efficient network management strategies. Normally, network choices rely on the company budget, network coverage, and internal and external regulations. Effective network security requires constant upgrades and close monitoring to ensure possible loopholes are sealed in time.…

    • 3344 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    WIMAX WHITE PAPER

    • 2248 Words
    • 7 Pages

    Introduction No network is 100 % secure. The idea that someone is possibly able to hack your network and use your credit card information or steal important data from a bank or a company cannot be acceptable. Therefore, the internet network and its security are considered as the most concerned issue in the telecommunication world.…

    • 2248 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Business Impact Analysis

    • 1018 Words
    • 5 Pages

    • If not performed аt аll, how much loss would the foundаtion suffer? • If not performed in а timely mаnner, how much finаnciаl loss would the foundаtion suffer?…

    • 1018 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Nids

    • 2445 Words
    • 10 Pages

    10. References 1. Overview 1.1 What is Internet Security? In today’s environment we need to contact each other through networks. Most of the devices or networks are interconnect to other devices or networks. As a result of this connection you are able to share your files, documents, etc. but when you are sharing you need to connect to a network and to the internet. When you connect to the internet you are taking a risk, cause your sharing files or documents may visible to others or intruders can steel your important files without a leaving a single mark. As a result of this Internet Security was introduced to protect your system from intruders.…

    • 2445 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    The vulnerability of information systems is increasing as we move to a world of networked and especially wireless computing. Theoretically, there are hundreds of points in a corporate information system that can be subject to some threats. These threats can be classified as:…

    • 2074 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Business Analysis Project

    • 11576 Words
    • 47 Pages

    |1.1.2 |Singapore Telecommunication Industry Players Mobile Market Share |10 | |1.1.3 |Singapore 3G Mobile Customer Growth |11 |…

    • 11576 Words
    • 47 Pages
    Powerful Essays
  • Powerful Essays

    Risk Assessment

    • 1733 Words
    • 7 Pages

    Networking security personnel play a major role in the security of anything and everything within the network. There are risks involved with keeping servers secured when people try to hack into the system. Cyber security personnel are responsible for keeping all the information secure that is on the network. Key roles that will play a big part in the completion of this project will pertain to network security and reliability and…

    • 1733 Words
    • 7 Pages
    Powerful Essays