Preview

NTC411 Week 5 Security Solutions

Better Essays
Open Document
Open Document
890 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NTC411 Week 5 Security Solutions
Week 5 Security Solutions
T. Lee
NTC/411
November 2013

Week 5 Security Solutions In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information. E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded. Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with



References: Cisco Systems. (2007). Cisco Intrusion Detection. Retrieved from http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/index.shtml Cisco Systems. (2012). Internetworking Technology Handbook. Retrieved from http://docwiki.cisco.com/wiki/Internetworking_Technology_Handbook Cisco Systems. (2012). Intrusion Prevention System with global correlation. Retrieved from http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6634/at_a_glance_c45-578661.pdf Cisco Systems. (2013). Cisco ASA 5500 Series Next Generation Firewalls. Retrieved from http://www.cisco.com/en/US/products/ps6120/index.html Cisco Systems. (2013). Cisco Web Security Appliance. Retrieved from http://www.cisco.com/en/US/prod/collateral/vpndevc/ps10142/ps10164/aag_c45-716641.pdf Kaspersky Lab. (2013). Heuristic analysis in Kaspersky Anti-Virus 2013. Retrieved from http://support.kaspersky.com/us/8641 Lord, N. (2012). Common malware types: Cybersecurity 101. Retrieved from http://www.veracode.com/blog/2012/10/common-malware-types-cybersecurity-101/ Skillport. (2013). CompTIA Network+ 2012: Network security part 3. Retrieved from Skillport, NTC411 - Global Network Management, Support, and Security website. Symantec Corporation. (2013). Vulnerability trends. Retrieved from http://www.symantec.com/threatreport/topic.jsp?id=vulnerability_trends&aid=zero_day_vulnerabilities

You May Also Find These Documents Helpful

  • Good Essays

    Another important security feature for routers and switches are the extended access list (ACLs), which is a rule and must be implemented to control/filter the network traffic from the un-trusted networks. “You can use access lists to restrict contents of routing updates or to provide traffic flow control, One of the most important reasons to configure access lists is to provide security for your network.” [2] The switching device which is a layer 2, have several ports, are proposed to shut down all unused ports and use MAC addresses to avoid any access point (AP) placement. In the proposed Gliffy network diagram, an Intrusion Detection System (IDS) is depicted. "An IDS is a special network device that can detect attacks and suspicious activities." [4] It will just detect threats and will not take any action to stop the attack. It will be accounting firm's analyst responsibility to monitor the logs and interpret them correctly for the false and real time…

    • 940 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NTC 411 Week 4 Individual Network Security. NTC 411 Week 4 Summary.…

    • 151 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NTC 415 Network Integration Project Entire Course http://www.accttutorials.com/downloads/ntc-415-network-integration-project-entire-course/ Click above Link to get this A Graded Material For More information visit our website: http://www.accttutorials.com NTC 415 Network Integration Project Entire Course NTC 415 Week 1 DQs. NTC 415 Week 1 Individual Enterprise Network Architectures. NTC 415 Week 2 DQs. NTC 415 Week 2 Individual Network Connections Paper.…

    • 146 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Mallery, J., Zann, J., Kelly, P., Noonan, W., Seagren, E., Love, P., et al. (2005). Hardening Network Security. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Lan Consulting Plan

    • 2879 Words
    • 12 Pages

    Axia College. (2006). Network security. Retrieved August 28, 2009, from Axia College, Week Seven, IT 240 Intro to LAN Technologies.…

    • 2879 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cyber security must be an aggressive and evolving practice. Not only is it important to put security in place for current technology that can access electronic information, but also to look forward to future trends and strategies. Methods must also be developed that will continuously protect information regardless of growth and technological advances. As trends change and new technology develops it is the responsibility of businesses to balance cost saving measures with adequate security measures.…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Gandhi, M. , & Srivatsa, S. Detecting and preventing attacks using network intrusion. International Journal of Computer Science and Security, 2(1), 49-60. Retrieved , from http://www.cscjournals.org/csc/manuscript/Journals/IJCSS/Volume2/Issue1/IJCSS-28.pdf…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Better Essays

    In the field of policing there are a couple different paths for an individual to choose from and they include private security and public policing. State government, city government, and towns normally provide the community with a public police force to enforce the laws and protect the citizens. Police officers are very important within a community but sometimes a private security can come in and help out and this frees up time for the public policing. Private security personnel generally work for a private company that handles their own dispatching, training and recruiting. Private security functions include loss-prevention duties or protective services that would not be handled by public policing. Private security also specializes in closed circuit monitoring services, secret level clearance, drive by patrol. Private security does not have the authority to arrest anyone either; however they can detain until law enforcement get there. Public policing officers are a function of the executive branch of government. Public officers are paid entirely from public funds that generate from grants, public sources, and revenues from taxes. Most private security organizations are paid from collecting a fee from their client. It is not uncommon for private security to go undercover like public police also, so that they can blend in the environment and be used as asset protection. The goals and training of private security and public policing are similar to each other. Private security and public policing are unique and successful in their own ways. The way that the private security and public policing organizations function and interact within each other is different; however they both function with leadership. The differences in public policing and private security would include the duties of the job. Police officers duties include responding to emergency calls, patrol public streets and monitor the…

    • 1225 Words
    • 5 Pages
    Better Essays
  • Good Essays

    It is undeniable that online payment systems are on the upswing in today’s society, the USA and the world. Electronic payments are now being used by government agencies for direct deposit tax refunds and to pay government benefit via the use of debit cards. Individuals are also using electronic payments to settle financial transactions without the use of checks or cash. These electronic funds transfers can actually make currency conversions, if necessary. Further, companies are giving discounts on services if they are allowed to electronically draft an account (demand or credit card). With this increase in ecommerce transactions, it is reasonable to expect an increase in cybercrime. Therefore, as a consumer a major concern is the protection of identities, especially mine. The online security issues relating to the dimensions of ecommerce security stood out the most because it deals with identity and information protection. Specifically, possessing the integrity to secure and protect privacy, confidentiality and availability of personal information, is of major concern. The ability to protect and an individual’s identity and privacy is difficult to secure in an ecommerce society because individual integrity cannot be policed, “public record” is available to anyone who looks for it, and people’s lack of computer knowledge.…

    • 743 Words
    • 3 Pages
    Good Essays