Computer Networking Security

Good Essays
Angela Harris
CSCI 1141
Joshua Montgomery
February 20, 2013

Securing Information in Business

In order to protect organizations from data theft, the following steps should be followed to secure company networks and information:

Discover & Assess Risk –Network and agent-based scanning, plus assessment, provide the depth and breadth of info needed to make the right decisions.

Establish & Enforce Policy –Whitelisting capabilities ensure that only those authorized applications can execute and only those authorized removable devices can be accessed on specific endpoints by specific users. Having the ability to set policies that enable flexibility is key – some policies are only appropriate for some users or departments and not others.

Fix Open Vulnerabilities –These vulnerabilities are in operating systems, applications, web browsers, and virtualized platforms. If you can stay on top of the vulnerabilities that are critical to your organization then you can mitigate a lot of the risk of outside attackers targeting insiders.

Control and Monitor Devices –While many of these devices provide benefits that enable a more productive workforce, they also must be managed because of the storage capacity and ease of which data can be moved on and off. Also these devices can introduce malicious code onto your network quite easily. It is imperative to employ systems and practices that enforce what devices are authorized or not, by what users and on what machines. Also necessary is the ability to track what information is being moved on or off these devices.

Audit – Having visibility into what your users are doing, what data is being moved and what applications and vulnerabilities are in your environment is very important. High level and low level auditing capabilities provide necessary levels of insight into the effectiveness of your policies and enforcement capabilities.

The technology involved in information security changes and improves as time

You May Also Find These Documents Helpful

  • Best Essays

    Computer Networking

    • 1224 Words
    • 5 Pages

    1…………………………………………………….3 Recommandation……………………………………….4 Task2 Data Transfer rate and/or Memory Storage space..5 Hardware options……………………………………..5 Cost of Purchase and installation…………………...5 Fig .2 ………………………………………………….6 Recommandation……………………………………..7 Task3 Security Issues………………………………………8 Protection from viruses, Trojan horses………….…9 Conclusion………………………………………….10 Reference……………………………………….…...11 INTRODUCTION A firm of architects is installing a data network for use by staff in its offices. The…

    • 1224 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Computer Networking

    • 1332 Words
    • 6 Pages

    INTRODUCTION Computer networking is the engineering discipline concerned with the communication between computer systems or devices. A computer network is any set of computers or devices connected to each other with the ability to exchange data. It is sometimes considered a sub-discipline of telecommunications, computer science, information technology and computer engineering since it relies heavily upon the theoretical and practical application of these scientific and engineering disciplines…

    • 1332 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    computer networking

    • 4384 Words
    • 32 Pages

    Computer Networking Type A: Very Short Answer Questions 1. Ans: 2 Ans: 3 Ans: 4 Ans: 5 Ans: 6 Ans: 7 Ans: 8 Ans: 9 Ans: 10 Ans: 11 Ans: Define a network. What is its need?  A computer network is a system in which computers are connected to share information and resources.  Computer networks help users on the network to share the resources and in communication. Write two advantages and disadvantages of networks.  Advantages: 1. Data or information can be shared among the user. 2. Fast communication…

    • 4384 Words
    • 32 Pages
    Good Essays
  • Good Essays

    Computer Networking

    • 781 Words
    • 4 Pages

    What is a client program? What is server program? How p2p works? (5) Answer: A networking program usually has clients programs and servers programs, each running on a different host and communicating with each other. The program that initiates the communication is the client. Typically, the client program sends service requests to server and server program provide service to client. Informally, clients tend to be desktop and mobile PCs, Smartphone, and so on, whereas servers tend to be more powerful…

    • 781 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Computer Networking

    • 366 Words
    • 2 Pages

    described as under: 1.0 Overview Through Question Bank System (“QBS”) we are looking forward to prepare a large corpus of the multiple choice questions in the area of General English, Quantitative Reasoning, Logical Reasoning, Mathematics, Computer Science and Electronics & Communication. Faculty members from various universities/institutions/colleges will be enrolled online for the contribution of the questions in the area of their interest. Another group of faculty member will do the validation…

    • 366 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Computer Security

    • 768 Words
    • 4 Pages

    Computer Security Student Name University Abstract James works for a bank, and he spends most of his attending to bank clients and travelling. He always carries with him a laptop that contains confidential bank information. The Operating System of the laptop was last updated in May 2011. Some of the programs James uses are MS word 2007, MS Access and MS Excel. James’ computer is, however, not well secured. It does not have a firewall or an antivirus. In addition, the data in the laptop are…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Computer Security

    • 414 Words
    • 2 Pages

    Computer Security Many commercial software packages are designed with computer security features that control who can access the computer. These types of access controls use a process called identification and authentication. Identification verifies that the user is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information, possessed objects, and biometric devices. With remembered information, a…

    • 414 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Computer Security

    • 792 Words
    • 4 Pages

    Computer technology permeates most aspects of our lives. The ability to use computer technology and to evaluate electronic information has become a basic skill for most of people. In most places of business, a computer is standard. In the bank they use computers to look up for account information. They use computers in the auto repair shop to assess the cars. We can't find books in the library by looking in a card catalog — we must use a computerized database. Doctors' offices utilize computers…

    • 792 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer Security

    • 810 Words
    • 4 Pages

    that pertains to all people. The law that amended the Computer Fraud Abuse Act of 1986 is the National Information Infrastructure Protection Act of 1996, it changed several sections of the Computer Fraud Abuse Act and increased the penalties for selected crimes. The law that was specifically created to deal with encryption policy in the US was the Security and Freedom through Encryption Act of 1999. In an information security context, privacy is not absolute freedom from observation,…

    • 810 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Computer Networking Manager

    • 3512 Words
    • 15 Pages

    physical data center rooms and a brief inventory of the infrastructure (networking equipment / servers / etc.) was undertaken in order to acquire an orientation with regards to the Networking Equipment utilized. Internal interviews have been conducted with the company technical & capability leads (networking / design / security) with regards to the same. A) Internet Infrastructure investigation report:- 1- Networking Server & Client Operating System Environment:- Server Environment:-The…

    • 3512 Words
    • 15 Pages
    Powerful Essays