Network Security Measures

1138 Words3 Pages

Identify Security Measures Which Address These Threats and Vulnerabilities

Any network is vulnerable at its weakest point and perpetrators will try to get in any way that they can. Some just to see if they can and others for manipulated personal gain. Security measures, policy and procedures are written and tailored to meet the specific needs of an organization. Security tools are installed on networks to keep out cyber criminals.

Vulnerability is a weakness in a security system. A threat is a set of circumstances that has the potential to cause loss or harm. How do we address the problems of threats and vulnerabilities? We use control as a defensive method. Control is an action, device, procedure, or technique that removes or reduces vulnerability. (Pfleeger & Pfleeger, 2007)It is essential to have adequately qualified IT personnel on the security team to properly monitor the network’s activity log because this log records the activities occurring in an organization’s systems and on its networks.

It is important that the Information Security Officer (ISO) ensures that every person on the security team is educated and accurately trained in security measures, policies and procedures in addition to making sure that each individual knows their role and what steps to take in case the network is compromised. Time is of the essence and could possibly be the life line of a company when its network is being attacked.

Steve Forrester, Vice-President of Sales at Jacket-X reconnected his company laptop to the corporate local area network (LAN) without being subsequent to the company’s policy; the Intrusion Detection System (IDS) alerted the ISO Jack Wilson that a malicious worm was attacking the server. The worm immediately ex...

... middle of paper ...

...rity and a resigning of the policy letter. It is everyone’s responsibility to keep the system’s network as secure as possible.

Works Cited

Geier, J. (2005). Wireless network first-step. Indianapolis, IN: Cisco Press

Goodric, M., & Tamassia, R. (2010). Introduction to computer

security, (1st ed.). Canada: Addison Wesley

Pfleeger, C.P., & Plfeeger, S.L. (2007). Security in computing,

(4th ed.). saddle River, NJ: Pearson Education, Inc.

Kent, K.,& Souppa, M. (September 2006). Guide to computer

security log management. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf

The vulnerability of organizational networks and the internet.

CSEC 610 9041 online classroom, achieved at: http://webtyco.umuc.edu

Information systems infrastructure. CSEC 610 9041 online

classroom, achieved at: http://webtyco.umuc.edu

More about Network Security Measures

Open Document