Preview

Assignment 2: Business Impact Analysis

Good Essays
Open Document
Open Document
349 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Assignment 2: Business Impact Analysis
Security threats in a network environment are far much detrimental and can always paralyze operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).
To secure the network and ensure a degree of protection from external intrusion, the first step is to ensure it is a private network and each host in the different remote locations is part of the private network; this minimizes the intrusion from public networks. Through the use of firewalls in the central computer network enforces authentication of all users in the network thus minimizing internal and external unauthorised access (Stallings, 2007).
To secure against attacks from the internet and the external networks the use of a strong antivirus software and internet security software in all the workstations, hosts and servers is important. In addition to this it is important to have a network security policy that will clearly stipulate the use of the Library property and also provide the guidelines on using personal resources in the library network. Since the network is private a white list of all authorised wireless networks should be maintained to avoid unauthorised access from external wireless networks. It is also important to ensure that all hardware and software is in secure zones and environments to avoid physical damage (Stallings, 2007).
These are basic steps towards securing the central database from attacks such as denial of service that is mainly caused by unauthorised access. The strategy is simple and less costly thus cannot cause strain on the budget.
Kaeo, M. (1999). Designing network security.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    When configuring windows networking, two major approaches are valid to secure all the network resources, the workgroup approach and the Domain approach. The workgroup approach is simply to create a windows peer-to-peer network with a decentralized security system. This workgroup security approach…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Between every network and the outside host of threats there is a first line of defense. For almost every network this will be a firewall. A firewall can be both hardware and software and is usually a combination of the two. A firewall creates a barrier between networks. Any outside computer or client must pass through the firewall to access the network or its resources. Only a computer or system that has proper access can easily access a network protected by a properly configured firewall. Though it is not infallible, a firewall is the first and perhaps best means of security…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    If you have a more than one computer connects in home. It is important to protect every computer. You should have a hardware firewall (such as router) to protect your network, but you should also use software firewall on each computer to prevent the spread of virus your network.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Global Finance, Inc. (GFI) is a hypothetical company, which has grown rapidly over the past year. GFI has invested in its network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its overall network security posture has not kept up with the company growth. The trusted computing base (TCB) internal network within the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems that are vital to the company’s operations that also affect the overall financial situation. The most vital application servers is the company is their Oracle database and email system. GFI cannot afford system or network outages, as its cash flow and financial systems heavily depend on the network stability and availability. GFI has recently experienced multiple network attacks resulting in a total estimated loss at more than $1,000,000.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Company executives at Tri-Corp have requested a remote access solution as part of their systems upgrade. The company desires its employees to have access to the network from their home PC’s and laptops as a method to help improve productivity and eliminate unnecessary travel and paperwork. In order to function more efficiently, many companies across the globe require remote access to their server systems. A remote access solution will provide Tri-Corp with a proven method to retrieve data from remote locations and them with the opportunity for their executives to complete necessary tasks on the go. However, remote access may provide intruders a method to access Tri-Corps secure data. These vulnerabilities may expose the risk of exploitation and have caused irreparable damage…

    • 5676 Words
    • 23 Pages
    Powerful Essays
  • Better Essays

    Business Impact Analysis

    • 1018 Words
    • 5 Pages

    • If not performed in а timely mаnner, how much finаnciаl loss would the foundаtion suffer?…

    • 1018 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Business Impact Analysis

    • 1120 Words
    • 5 Pages

    The purpose of this essay paper is to elaborate on the Business Impact Analysis (BIA), which is designed to assist management in determining which functions are critical to the continued operation of the organization. The organization that Team A selected is the City of Hollister Police Department. Team member Don Magnuson is currently a sworn Police Officer for the department and executes his duties with the dedication to protect and serve the communities in which he patrols. Team A will introduce to you the Hollister Police Department, and demonstrate how the management operates within the guidelines and assistance of the Business Impact Analysis.…

    • 1120 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Business Impact Analysis

    • 1075 Words
    • 5 Pages

    In the process of discussing their interdependence, (James F. Broder, 2012), keep in mind the business. The key processes all occur in every business functional areas. The main point of any business about a business disruption is the financial impacts and operational impacts. The operational impacts will address the nonmonetary impacts which will include technology, processes and people while the financial impacts will specifically focus on the monetary impacts and look at how the…

    • 1075 Words
    • 5 Pages
    Better Essays
  • Better Essays

    4. What is the definition of Recovery Time Objective (RTO)? Why is this important to define in an IT Security Policy Definition as part of the Business Impact Analysis (BIA) or Business Continuity Plan (BCP)?…

    • 790 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    WIMAX WHITE PAPER

    • 2248 Words
    • 7 Pages

    No network is 100 % secure. The idea that someone is possibly able to hack your network and use your credit card information or steal important data from a bank or a company cannot be acceptable. Therefore, the internet network and its security are considered as the most concerned issue in the telecommunication world.…

    • 2248 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Physical Security

    • 724 Words
    • 3 Pages

    After reviewing several articles on the Internet, I chose the topic of physical security and an article entitled “Lock IT Down: Don 't overlook physical security on your network”. This particular article peaked my interest because it addresses the various aspects of physical security that can often be overlooked in a world that is so highly focused on threats of cyberterrorism, virus attacks, hacking, application and network security. What caught my attention was the line, “If the server is sitting in the middle of your office where anyone can get to it, you might as well not have any security at all.” (Bogue, 2003)…

    • 724 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nids

    • 2445 Words
    • 10 Pages

    In today’s environment we need to contact each other through networks. Most of the devices or networks are interconnect to other devices or networks. As a result of this connection you are able to share your files, documents, etc. but when you are sharing you need to connect to a network and to the internet. When you connect to the internet you are taking a risk, cause your sharing files or documents may visible to others or intruders can steel your important files without a leaving a single mark. As a result of this Internet Security was introduced to protect your system from intruders.…

    • 2445 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Is 305 Week 3 Lab

    • 806 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 806 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    As a Network Administrator student I would have suggested that they would also include VPN (Virtual Private Network) for they would have a much better secure network and database.…

    • 363 Words
    • 2 Pages
    Satisfactory Essays