StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Securing Jacket-X Corporations Network against Cyber Threats - Coursework Example

Cite this document
Summary
The paper "Securing Jacket-X Corporations Network against Cyber Threats" states that Jacket-X can best ensure data security in stored devices by using data encryption. In this case, plaintext data is converted into ciphertext so that it cannot be read. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.3% of users find it useful
Securing Jacket-X Corporations Network against Cyber Threats
Read Text Preview

Extract of sample "Securing Jacket-X Corporations Network against Cyber Threats"

Securing Jacket-X Corporation’s network against cyber threats Information Technology Network Infrastructure Security One of the ways by which Jacket-X can enhance its capability to carry out its objective as well as secure its ability to achieve its goals and vision would involve guarding its support infrastructure. Key to Jacket–X infrastructure is its information and network system that facilitates the day to day running of the organization and supporting productivity. It is therefore important that Jacket-X put in place policies as well as strategies that will enhance its information technology and network infrastructure. Key areas to address so as to avert cyber threats are: network security, protocol and services, user security, password security and data storage security. Network Security It is important for Jacket-X to implement ways of detecting and securing networks so as to counter cyber threats vulnerabilities such as email spoofing, denial of service attack, malware intrusion, spywares, hackers as well as data and information theft that are implemented through the network (Roberta Bragg, 2004). However there are several methods by which Jacket-X can implement to avert these risks they include the following: first is by Jacket-X ensuring the installation of firewalls. Firewalls comprises of hardware and software that controls the flow of data in and out of network. By using firewalls Jacket-X can be able to examine and validate address information on all packets of data as well as protect data stored in the network from unauthorized access (Roberta Bragg, 2004). It is therefore recommended for Jacket-X to put in place procedures and policies to allow for the periodical evaluation of firewalls and upgrades that involves the incorporation of current technologies to meet critical network risks. In the case of Jacket-X’s wireless network, it would be advisable to enable WPA (Wi-Fi Protected Access) encryption to facilitate the protection of data that is transmitted over a wireless network. WPA is considered more secure that WEP (Wireless Equivalent Privacy) because it utilizes dynamic key encryption. Also in order for Jacket-X to gain control of their network from unauthorized access would involve the use of MAC address filtering. This technique is made possible by some routers to specify which computers can access the network (Roberta Bragg, 2004). This is facilitated by using a MAC address that comprises of unique series of numbers and letters assigned to every networking device. This would prevent unauthorized access such as hackers from intruding the Jacket-X network. Another vulnerability posed by networks is the fast transfer of malwares such as viruses, adware, Trojans and worms that intercept the networks and cause harm to network system by destroying information and lowers the performance of computer systems. It is therefore important for Jacket-X to install counter-malwares applications and policies that can address this threat (Salvatore Joseph Stolfo, 2008). A notable way would be to install anti-malware software to secure the network key being anti-virus packages that clean, quarantine as well as delete malicious files and codes. Jacket-X should also include a policy of regular updates to ensure anti-malware software remain effective to new threats. Another network securing strategy that Jacket-X should adopt is network access control. This can be best implemented by using separate accounts for its staff both with different privileges and roles. For instance Jacket-X can have account for administrators and users. The administrator’s role would involve security implementation and user account management. This separation of accounts would facilitate network security against control by unauthorized personnel as well as facilitate monitoring of user activity. Protocols and Services Protocols are meant to provide high quality services to clients (protocolsecurity). It is important for Jacket-X to better train their security officers to manage better security protocols and services. These security protocols and services involve control of entry and exit points, external patrols of buildings facilities, screening of staff and visitors by use of electronic scanners as well as conduct patrol lock down for all windows and doors. As for services Jacket-X should ensure installation and maintenance of security alarm systems, installation of access control and closed circuit television as well as punctual attendance to alarms (protocolsecurity). By Jacket-X ensuring strict and constant adherence to its set protocols, it stands a better chance of intercepting and containing cyber threats that may cripple and adversely affect its information technology and network infrastructure. User security User security involves 2 key elements which are authentication and authorization. Authentication ensures that only valid users are logged in based on user ID and password provided by the user (adobe). Authorization on the other hand ensures those users logged-in are only allowed to carry out operations for which they are allowed to carry out operations for which their roles permit. One way Jacket-X can ensure this is through application authentication. In this case an application performs all user authentication and authorization and tracks user activity and logs (adobe). By Jacket-X assigning roles it is able to ensure that there is controlled access in application resources without the need to maintain knowledge about individual users. Password Security Passwords form a critical part of information and network security. They are important in protecting user accounts from unauthorized access however they possess serious network risks when compromised (Salvatore Joseph Stolfo, 2008). It is therefore important for Jacket-X to ensure that appropriate steps are taken to ensure that they create strong and secure passwords as well as safeguard them at all times. Some of the guidelines Jacket-X can effect to secure passwords include: first of all ensuring the password is not the same as user ID, secondly passwords must have a considerable length to minimize cases of accurate guessing, and it should also be set in a way that makes them easier to remember but hard for someone else to guess, it should also important that passwords are not trivial, predicable or obvious (Salvatore Joseph Stolfo, 2008). If Jacket-X undertakes these standard guidelines they stand a better chance of attaining accountability during transactions as well as other changes to system resources inclusive of data. Data Storage Security Securing stored data involves the prevention of data from unauthorized personal as well as prevention against accidental, intentional or corruption of information (John Chirillo, 2003). Jacket-X must take steps to secure data by understanding applicable threats as well as continuous monitoring of activity logs. There are several ways Jacket-X can secure stored data, this involves: implementing a tiered data protection and security model which includes perimeter rings of defense to applicable threats (John Chirillo, 2003). By enforcing multiple layers of defense Jacket-X can isolate and protect data in the case where defense perimeters have been compromised from either internal or external threat. Secondly Jacket-X can include both logical in this case authorization, authentication, encryption and use of passwords as well as physical security measures such as restricted access and locks on server, storage and networking cabinets (John Chirillo, 2003). Logical security includes securing network with firewalls, running anti-malwares on servers and network-addressed storage system. It is also recommended that Jacket-X implement storage system based volume or logical unit number mapping and masking as a line of defense for your stored data. Also Jacket-X can best ensure data security in stored devices by using data encryption. In this case plaintext data is converted into cipher text so that it cannot be read. Encryption facilitates protection of stored data by shielding its meaning from unauthorized access. This can be achieved by using encryption software such as true crypt that can encrypt data stored data in devices through encryption and control access by use of password authentication. Another way through which Jacket-X can ensure data security of stored devices involves the use of back-ups and data archives that are secure (John Chirillo, 2003). By providing redundancy of data Jacket-X can protect itself from total loss of data by utilizing its redundant data sources. This can be done by using cloud data back-up services or through use of redundant storage devices such as raiding storage devices to prevent the total loss of data. Conclusion Data security is an important issue that has been given enough attention. Information assets are becoming significant assets in any organizations. Proper policies should be put into place to ensure that standards are followed for proper use of information assets. With competition shifting to how best assets are used and data mining being a strategic tool, it is becoming important and critical to have proper safeguarding of information. Reference adobe. (n.d.). About user security. Retrieved April 2, 2012, from livedocs.adobe: http://livedocs.adobe.com/coldfusion/8/htmldocs/help.html?content=appSecurity_04.html John Chirillo, S. B. (2003). Storage security: protecting, SANs, NAS, and DAS. Wiley Publishers. protocolsecurity. (n.d.). Products and Services. Retrieved April 2, 2012, from protocolsecurity: http://www.protocolsecurity.com.au/products.htm Roberta Bragg, M. R.-O. (2004). Network security: the complete reference. Osborne: McGraw-Hill. Salvatore Joseph Stolfo, S. M. (2008). Insider Attack and Cyber Security: Beyond the Hacker. Springer. Schulz, G. (2006, August 3). Top 10 ways to secure your stored data. Retrieved April 2, 2012, from Computer world: http://www.computerworld.com/s/article/9002188/Top_10_ways_to_secure_your_stored_data?taxonomyId=19&pageNumber=1 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybersecurity Coursework Example | Topics and Well Written Essays - 1250 words”, n.d.)
Cybersecurity Coursework Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1592855-cybersecurity
(Cybersecurity Coursework Example | Topics and Well Written Essays - 1250 Words)
Cybersecurity Coursework Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1592855-cybersecurity.
“Cybersecurity Coursework Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1592855-cybersecurity.
  • Cited: 0 times

CHECK THESE SAMPLES OF Securing Jacket-X Corporations Network against Cyber Threats

Network Security Threats and Their Solutions

This paper ''Network Security threats and Their Solutions'' discusses that networks have continued to expose innocent users to cyber terrorism, whereby criminals break into the networks through various methods such as hacking, cracking, spoofing and wiretapping among others.... However, these networks are vulnerable to numerous security threats, which have the capacity to cause extensive damage and losses for the users (Andress, 2011).... This paper is a critical evaluation of network security threats and their solutions....
11 Pages (2750 words) Literature review

How to Save Organisations from Hackers

To highlight the threats to which IT companies are exposed with regards to hacking, the essay has used RSA's hacking incident in which attackers used phishing to target low-level users of RSA's information systems.... his paper explores the various types of cyber and security threats to which information and technology companies and there ISs are exposed and the role of employee alertness in averting these threats, particularly those originating from hackers' using social engineering....
26 Pages (6500 words) Report

Advanced Persistent Threats against RSA Tokens

The paper ''Advanced Persistent threats against RSA Tokens'' tells that Today, where every technology interrelated to Information technology involves the '.... Likewise, a new class of challengers called now 'Advanced Persistent threats (APT) demonstrates a well-planned and sponsored, highly skilled hackers targeting highly classified data for gaining competitive edge specifically incorporate businesses, law firms, military networks, national or international politics (Cole, 2012)....
5 Pages (1250 words) Essay

Advanced Persistent Threats Against RSA Tokens

These mobilized resources were aligned to counter apparent cyber threats from terrorist attacks.... Moreover, the net-centric ATM connectivity raises concerns for cyber security threats and vulnerabilities.... Propagation threats are critical because it is capable of rapidly broadcasting traffic on the Internet along with bypassing intrusion detection systems.... Likewise, a new class of challengers called now as ‘Advanced Persistent threats' (APT) demonstrates a well-planned and sponsored, highly skilled hackers targeting highly classified data for gaining competitive edge specifically in corporate businesses, law firms, military networks, national or international politics (Cole, 2012)....
5 Pages (1250 words) Case Study

Threats and Methods to Secure a VoIP Network

he threats to security and privacy could be in the form of DOS (denial of service), malformed messages, sniffing, spoofing, vishing, VOIP spam and SPIT (spam over VOIP).... o protect networks from these threats, one of the key aspects is the methodology of securing information; that is, to conceal the signals and media in real time communications from unauthorized entities through cryptography.... Therefore this dissertation will examine some security concerns and protection methods by analyzing the threats to VoIP network and consequently determine how to deal with them from design, quality of service and management perspectives....
17 Pages (4250 words) Essay

Cyber Attacks Against America Infrastructure

With the invention of computers and the Internet, it is difficult to envision what would happen if a massive cyber attack aimed at the major countries' cyber infrastructure and to.... According to an article published by Digital Journal, pressing the F1 key will cause cyber attack.... How could we survive today if cyber terrorists will cripple all mobile phones, telephone infrastructure, and electric grid?... n this scenario, no organization in today's world is immune to cyber attacks, whether they are government, non-government or business....
16 Pages (4000 words) Research Paper

Cloud Storage as a Means for the US Government to Store Data under Various Security Designations

The potential vulnerabilities pre-set threats such as hacking and intrusion by malicious outsider and insider which in the case of the department of treasure and Defence have been recently evidenced by constant hacking and access to data.... This paper "Cloud Storage as a Means for the US Government to Store Data under Various Security Designations" examines the nature of security and then focuses on the potential underlying vulnerabilities that could threaten the integrity confidentiality, availability, and authenticity of the data....
14 Pages (3500 words) Case Study

Hacking and Hackers

Several types of research are being conducted, focusing on the hackers and threats posed by them to the information systems of various organizations.... This paper "Hacking and Hackers" gives a brief description of network hacking techniques, various types of biometrics that can be integrated into the network security features, and the recent trends in network security involving biometrics for battling the attacks of the network hackers....
8 Pages (2000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us