Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Network security quizlet
Network security quizlet
Network security quizlet
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Network security quizlet
Introduction
What is the worst that could happen to a large insurance and financial corporation with facilities in several states? Exploring the seven domains of a typical IT infrastructure leads to several possibilities. One possible scenario for each of the seven domains, user, workstation, LAN, LAN-to-WAN, remote access, WAN, and system/application will be explored in depth and taken to the furthest worst-case scenario.
User Domain
The user domain can be a very large security hole that is not easy to cover. Helping people understand the value and reason behind certain security requirements can help close the gap, but it is something that needs to be continuous. One threat which people of a company face is social engineering. The
…show more content…
United States Computer Emergency Readiness Team defines social engineering as, “an attacker uses human interaction (social skills) to obtain or compromise information…,” (McDowell). This may be someone talking to you and obtaining information you might use as a password or security questions. They may ask probing information that may be confidential about the company. The worst-case for social engineering can be quite significant. This could possibly include identity theft and using your information to access information that should be secure. Someone could literally pretend to be another and gain all the access the original person has in the company, this may also allow them to request additional access the original person did not have. Once in, the attacker could potentially take as much information as wanted or destroy information or other assets. This could lead to loss of data, assets, revenue, and/or loss of reputation by the company. Workstation Domain One issue possible in the workstation domain is malicious software on an associate’s computer.
The worst-case scenario for malicious software would be the software traveling to other workstations and eventually servers. The hope would be that anti-virus or higher security in the rest of the network would keep it from traveling too far, but it is possible for something very new and very harmful to make its way to sensitive company servers.
LAN Domain
The LAN domain is subject to sniffer attacks. A sniffer is an analyzer that picks up data packets traveling inside of the LAN (Gibson, 2011, p. 9). A worst-case scenario for a sniffer attack would be sensitive information being gathered. This could be confidential information or personal information about an associate. Usernames or passwords may be picked up or company information, which would not be available to the public, could be picked up by the
…show more content…
attack. LAN-to-WAN Domain The largest risk of LAN-to-WAN is attackers finding a weakness in a firewall through a website. Worse case here is corruption or stealing of data, or taking down company systems with malicious software. If the company website becomes unavailable that can mean major loss of revenue and/or reputation to the company. Remote Access Domain Passing passwords as text is a major vulnerability to associates who use mobile access to the network.
This would allow and attackers to more easily steal the data and log in to the network pretending to be the associate. This could lead to the attacker gaining access to company assets and causing malicious acts. This could lead to outages, loss of data, or loss of integrity to the company.
WAN Domain
WAN is the internet to most companies (Gibson, 2011, p. 11). This can pose high risk to companies but is needed by associates to utilize company software and research. Natural weather occurrences and electrical issues can have an effect on the WAN. If the power or internet provider line is out due to a large storm or high winds, the internet is unreachable. Many associates have laptops, so work does not necessarily need to stop during an outage. However company phones and the internet will not operate. The company relies on many applications that utilize either the internet or intranet to be functional. Due to this, many people would not be able to continue working. The worst case scenario here is people being unable to complete work for several days on end until a severe storm has
passed. System/Application Domain Systems can be largely impacted by out of date applications. The company is also slow to upgrade software, fearing that changes may cause issues for the network or users. However, not upgrading software on a regular schedule can leave known security issues un-patched. The risk here is that the vulnerability is known, making it easier for attackers to penetrate company defenses.
However, I feel users had a different vision/perspective on security mechanisms and they trusted each other during those times and did not have to worry about protecting their information (this is how exactly, one person’s ignorance becomes another’s person’s - hacker, here bliss). This book helps us to understand the vulnerabilities; its impacts and why it is important to address/ fix those holes.
Cisco Designs, manufactures, and sells Internet Protocol (IP) - based networking and other products related to the communications and information technology (IT) industry and provide services associated with these products and their use. The company provides products for transporting data, voice within buildings, across campuses and globally. The products are utilized at enterprise businesses, public institutions, telecommunications companies and other service providers, commercial businesses, and personal residences. Cisco conducts its business globally and manages its business geographically. Its business is divided into the following three geographic segments: The Americans; Europe, M...
National Institute of Standards and Technology (NIST): Risk Management Guide for Information Technology Systems. Special Publication 800-30, 2002.
Security helps the organization meet its business objectives or mission by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets through the selection and application of appropriate safeguards. Businesses should establish roles and responsibilities of all personnel and staff members. However, a Chief Information Officer should be appointed to direct an organization’s day to day management of information assets. Supporting roles are performed by the service providers and include systems operations, whose personnel design and operate the computer systems. Each team member must be held accountable in ensuring all of the rules and policies are being followed, as well as, understanding their roles, responsibilities and functions. Organizations information processing systems are vulnerable to many threats that can inflict various types of damage that can result in significant losses (Harris, 2014). Losses can come from actions from trusted employees that defraud the system, outside hackers, or from careless data entry. The major threat to information protection is error and omissions that data entry personnel, users, system operators and programmers make. To better protect business information resources, organizations should conduct a risk analysis to see what
Digital world is dangerous because it is silent. Feeling secured is more dangerous because it makes the organization complacent. Hence, every organization should keep taking measures towards strengthening its security on an ongoing basis. This is possible by moving on to the next security level and embracing the new security techniques. After all, a stitch in time saves nine.
Over the years Microsoft’s domain architecture has changed and evolved significantly. The introduction of Active Directory has eclipsed the older Primary Domain Controller (PDC) and Backup Domain Controller (BDC) model used prior to the introduction of Windows 2000 Server. The role of the domain in Microsoft’s current network schema can be defined as “a logical group of computers characterized by centralized authentication and administration” (DiNicolo, 2004, p. 10). Today’s modern Microsoft domain architecture often utilizes the concept of multiple domains. Examples of the usage of multiple domains can be found in the design of Windows 2000 and 20003 network infrastructure. It is often necessary and more efficient to create multiple domains to reflect different departments within an organization or to reflect different geographic locations within a company. The addition of multiple domains can assist with the improving of replication performance between domain controller Active Directory databases as well as assisting in the administration of differing security policies. When multiple domains are used, Microsoft terminology describes the actual network architecture schema in terms of Forests and Trees (DiNicolo...
The role of the network is to improve data transfer and better documentation within the organization and beyond. User’s privilege can be determined through the network, an example is: determining what computer can access certain files on the network. These limitations can vary from user to user based on their role in the organization.
A virus can be within a file or an upgrade; this virus can harm the computer system and corrupt files within the PC. This is a potential risk because it leads to inefficiency in work i.e. a file that had important typed up information is corrupted then it becomes impossible to access, this leads to frustration and inefficiency in work as the document will have to be retyped except the individual had a backup.
As technology is becoming more prominent as 21-century workers, it become apparent that identity theft, viruses, malware and security breaches occur that can leak out an individual’s personal information or a client’s information in the office setting. Protecting identity in the office setting is a vital role into maintaining a safe job without the anxiety of identity theft. Data security is an issue that affects all businesses in the office setting, both big and small. All of these threats are gaining momentum as a crime that is conspicuous in American society. When a client goes to a business, they assume to have their data and information protected; which can cause a barrier into publicizing personal information. As technology is progressing,
Network management planning and security planning involves identifying the best and most appropriate systems and hardware that the firm can use to better manage network and plan security systems. Therefore, the management required me to examine the best software and hardware systems in the market place that the company can adopt to enable it to manage the network and security. The management required me to advice on the implementation procedure of various plans that are going to be adopted. My responsibility also involved finding out or predicting the impact of the plan on the future operations. They required me to evaluate the challenges the company might face while adopting the changes in the network management plan and security plans.
... the company or organization's information. The security roles of employees within the company and organization are responsible for the important information. Role-back Access Control will allow the company and organization to keep track of the users.
...rious consequences could surface which could ultimately lead to a loss of ones job. There are certain times and places were looking at different websites is ok and other times were it is just not acceptable.
Firewalls are a central point for attack, and if an intruder breaks through the firewall, they may have unlimited access to the corporate network.
To be able to use the intranet and e-mail they would have to have a
...you could down load a maliciousness virus that will provide them your sensitive information (Williams & Sawyer, 2013). It is critical to have firewalls in place to minimize social engineering on your personnel or companies network systems. But the first line of defense, in protecting your company against the loss of critical business information is to ensure that your employees are trained in security awareness (Goodchild, 2012). Hacker can still gain access to your systems even if you have the best security controls in place. It starts with your employees, you have to increase their awareness of how social engineering operates. If they know the signs, they will be able to prevent it. The most important thing is when you are on your personal or work computer, always remember PPI because you will never know who is on the other side of the computer networks.