StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

EISA: Evaluating and Meeting the Security Needs - Essay Example

Summary
The aim of the research "EISA: Evaluating and Meeting the Security Needs" is to analyze and evaluate the information security needs for the General Electric business process, the need for information security for the needs of General Electric Business, specifications for Security management…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
EISA: Evaluating and Meeting the Security Needs
Read Text Preview

Extract of sample "EISA: Evaluating and Meeting the Security Needs"

EISA: Evaluating and meeting the security needs EISA: Evaluating and Meeting the Security Needs Affiliation March 2008 GeneralElectric Corporation is going to adopt new technology platforms for the effective management of the business processes. However, to get benefits from this technology implementation, new technology arrangements and platforms need to offer the corporation helpful and efficient facilities. Additionally, the General Electric Corporation is interested in implementing both web based as well as client /server business networks. These both types of the business networks can face challenges or danger due to outsider and insider security threats. This paper presents a detailed analysis of the business security based considerations. The aim of this research is to analyze and evaluate the information security needs for the General Electric business process. Need for information security for needs of General Electric Business The network security is one of the most important issues and challenges that organizations are facing these days. In computer science, security encompasses the rules, techniques, tools, and technical measures that are used to stop or prevent illegal access or modification, theft, and physical damage to a network or a computer (Laudon & Laudon, 1999, p. 502). Additionally, the unlawful access to web based or corporate internal network can be terrible and hazardous for General Electric business. Thus, it is very important for General Electric Corporation to take account of its network for security threats and for this purpose they should appoint a security specialist who could train the business people (e.g. employees, management) on how to protect company’s network and useful data and information in preeminent manner. The data and information are the most important assets for any business. Because all the business decisions depend on the company’s data and information stored in the computers (Turban, Leidner, McLean, & Wetherbe, 2005). Thus, the security of these valuable assets is essential. In addition, it is vital to apply security measures in networked structures inside the General Electric Corporation. Because, in a network one PC can have many accessing points as well as can be used for against the law activities (Ray, 2004). In addition, General Electric Corporation’s network will have many employees working or using network instantaneously. In case of present General Electric organizational structures the security is one of biggest challenges. However, to get benefits from network technology implementation the effective management of all the security matters is really crucial. Since, we can try to classify and identify security threats and take actions to resolve these issues. According to Frederick (2002), different evils are associated with the network structures, for instance, personal information theft, business information hacking, illegal network intrusions, and virus attacks are the current challenges that corporations are facing nowadays in the computer networking areas (Frederick, 2002). In case of General Electric organizational information system, IT and network we can face lots of risks, assaults, and dangers such as hackers attack, viruses, data theft and so on. According to Kaminsky (2009), in case of the compromised IT security some data and network hackers or competitors can be able to access the business sensitive or critical data thus they can create big challenges for General Electric Corporation such as business destruction or data and information loss (Kaminsky, 2009). Therefore, for the General Electric Corporation’s information system, IT and network, we need to implement effective security management measures. Coming section presents a detailed overview of the specification for meeting security needs within an enterprise information systems architecture framework (General Electric Corporation). Specifications for Security management Here are the following procedures for the network security management and establishment: Network security policy: In managing and implementing the General Electric business IS and IT security management, there will be need for considering security initiatives for the business regarding the development of network security policy that are helpful regarding the management of any network security problem or difficulty. Since, these security initiatives are used by medium to large scale corporation (Bogazici University Computer Center, n.d; Fleishman, 2009). Antivirus software packages: Making use of Antivirus software packages is the most frequent and useful network security management method, thus, it will be very useful in managing and handling the General Electric business IS and IT and network security. In addition, these packages will be installed in all the systems of General Electric Corporation (Fleishman, 2009). Secure network infrastructure: It will be necessary to secure the General Electric business network routers, data servers, switches, hardware and software features that maintain safe network and data connectivity, network perimeter safety, identity services, intrusion protection as well as take other protection management steps (Curtin, 1998). Data encryption: The useful data and information of General Electric Corporation could be converted into non-readable or interpretable format; this method is acknowledged as data encryption. By using this technique we would be able to hide the vital business data for the transmission and storage to protect it from outside security attacks (Curtin, 1998; Ray, 2004). Virtual private networks: The use of virtual private networks is the most recent network security management facility that can offer General Electric business network access control as well as data encryption among two different computers on a personal or corporate network. In addition, it allows employees to link remotely to the network without the risk of data and information theft or loss (Cisco Systems Inc., 2010). Identity services: For the network security at General Electric Corporation we will need to implement the identity verification services. These identity services encompass digital certificates, passwords as well as digital verification keys (Kaminsky, 2009). Network Firewalls: The use of firewalls for the General Electric business network will be a helpful selection for the protection of the network from the outer security attacks. Since, the firewalls allow us to block the unauthorized and un-favorable network intrusions and accesses (Carnegie Mellon University, 2006; Nash, 2000). Conclusion At the present, network security has become a major concern for almost every organization, which is engaged in data sharing. This paper has presented a detailed overview of the security aspects, analysis, and management for a particular organization (General Electric business). This paper has outlined the main security needs for the General Electric business information systems and network structure. This paper has also specified some of main security management tools and techniques those can be useful in protecting the business network. Bibliography Bogazici University Computer Center. (n.d). What is Network Security? Retrieved March 26, 2010, from http://www.cc.boun.edu.tr/network_security.html Carnegie Mellon University. (2006, February 27). Home Network Security. Retrieved March 27, 2010, from Cert.org: http://www.cert.org/tech_tips/home_networks.html#III-B Cisco Systems Inc. (2010). What Is Network Security? Retrieved March 26, 2010, from Cisco.com: http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/secure_my_business/what_is_network_security/index.html Curtin, M. (1998, July 16). Introduction to Network Security. Retrieved March 24, 2010, from Interhack.com: http://www.interhack.net/pubs/network-security/ Fleishman, G. (2009, May 08). How to secure your home network. Retrieved March 25, 2010, from MacWorld.com: http://www.macworld.com/article/140436/2009/05/osxwindowshomenetworking.html Frederick, K. K. (2002, September 10). Evaluating Network Intrusion Detection Signatures, Part One. Retrieved March 26, 2010, from SecurityFocus.com: http://www.securityfocus.com/infocus/1623 Kaminsky, A. (2009). What is Network Security? Retrieved March 25, 2010, from WiseGeek.com: http://www.wisegeek.com/what-is-network-security.htm Laudon, K. C., & Laudon, J. P. (1999). Management Information Systems (Sixth ed.). New Jersey: Prentice Hall. Nash, J. (2000). Networking Essentials, MCSE Study Guide. California: IDG Books Worldwide, Inc. Ray, R. (2004). Technology Solutions for Growing Businesses. New York: American Management Association (AMACOM). Turban, E., Leidner, D., McLean, E., & Wetherbe, J. (2005). Information Technology for Management: Transforming Organizations in the Digital Economy, (4th ed.). New York: Wiley. Read More
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us