StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Security - Essay Example

Cite this document
Summary
This paper 'Network Security' tells that The primary purpose of implementing a computer network is to allow several staff members to enter and update data simultaneously. This paper presents an analysis of network security for the Athlete’s Shack, which runs its business through a chain of sporting goods stores…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
Network Security
Read Text Preview

Extract of sample "Network Security"

NETWORK SECURITY Network Security Affiliation Table of Contents Table of Contents 2 Type of Network Security 3 User and Password Based Access: 4 Firewalls 4 Antivirus Software 5 Data Backups 5 Network Security Devices 5 Security Cameras 5 DVDs/Tapes 6 Hardware Discussed 6 Printers and Scanners 6 Switch 6 Computer Server 6 Personal Computers 7 Recommendations 7 Staff Training 7 Update Passwords 7 Update Antivirus Regularly 7 Cloud based backup 8 References 8 Executive Summary In the past few years network security has turned out to be a serious challenge for the business organizations that heavily rely on business data and information. The basic purpose of implementing a computer network is to allow a number of staff members to enter and update data simultaneously. This paper presents an analysis of a network security for the Athlete’s Shack (TAS), which runs its business through a chain of sporting goods stores. This firm is emerging a huge business set up with a head office located in New York. In the past few years, TAS has got massive popularity and now it has 10 stores in the area. The staff of TAS comprises more than 500 people. In order to connect its different stores the business has implemented a wide area network (WAN). However, the internal activities are performed using local area network (LAN), which is established using cables and other hardware devices. The implementation of this network has brought a number of advantages and improvements to business however; in order to run its business operations effectively the firm has implemented an effective security mechanism. The firm has mixed a wide variety of security techniques to improve its network security. In this scenario, the business uses different security techniques to ensure the maximum security of its network. This paper discusses some of the important aspects associated with its network security. Type of Network Security Network security consists of a wide variety of rules, regulations and measures that an organization must follow with the intention of protecting its computer network and related resources. Without a doubt, in the past few years network security has turned into a main concern for each business in which computers are utilized to process data to a great extent. In addition, the absence of a network security can create many security challenges for a firm for instance a competitor or a hacker can gain access to private or vital information, which can destroy the entire business or personal information related to a specific system or data loss. In this scenario, an organization can implement effective network security when its employees and staff members have knowledge of network security. In simple words, in an attempt to ensure effective network security system users must follow organization’s security guidelines (Kaminsky, 2012; Ray, 2004; Laudon & Laudon, 1999). Athlete’s Shack (TAS) makes use of a wide variety of security techniques to ensure the security of its network and business data. Some of the important techniques are outlined below: Username and Password Based Access: Each employee is provided with a username and a password which they use in order to access and use the system. For this purpose, they have an IT Centre, which is responsible for determining the access type for the organization’s employees. Firewalls A firewall can be implemented in both hardware and software format as they are designed to stop illegal access to or from a private network. In addition, firewalls stop illegal Internet users from accessing private networks connected to the Internet, in particular intranets (Indiana University, 2012; Rouse, 2007). Since the different stores of the Athlete’s Shack (TAS) are connected using the Internet so they have implemented firewalls to secure their computers and network. Antivirus Software An anti-virus program stops viruses from entering into the computer network. In this scenario, TAS is using the latest version of Avira Antivirus1 that is very effective in dealing with different kinds of computer viruses. Data Backups As the business of TAS greatly depends on data so they regularly take backups of their data and store them in DVDs so that in case of any failure they could use that data. The firm has established an IT Centre which is responsible for carrying out this kind of tasks. Network Security Devices TAS has implemented both the hardware and software security firewalls to ensure the security of its network. It is some kind of filtering device that is used to filter the network traffic. In this scenario, it filters the traffic coming to network and going from the network. Security Cameras In order to ensure the maximum security TAS has placed security cameras at all sensitive locations. In this scenario, two security cameras are also installed in the server room and a number of security cameras are installed in staff areas. The basic purpose of these cameras is to keep an eye on activities of workers and detect any illegal physical access to organizational resources such as server room (Norton, 2001). DVDs/Tapes In order to take data backups and keep them secure for a long time, TAS makes use of Tapes and DVDs. It is easy to store and retrieve data using DVDs and the majority of computers come with a DVD drive so they are compatible. Hardware Discussed Printers and Scanners The basic purpose of establishing a computer network is to allow a number of employees to enter and process data simultaneously (Nash, 2000). A printer is used to take the receipt of the transactions. In this scenario, TAS uses its network to allow its employees to access a common printer and scanner. Switch A switch is used to control the traffic in a LAN. Basically, a switch is a device that receives the incoming data from a number of input ports to the particular output port and it will take the data toward its desired target (Rouse, Switch, 2007). All the systems are connected with each other via a cable and the terminals of these cables are connected to the switch in order to maintain this communication. Computer Server A computer server is a high quality computer that provides services to other computer programs (and their users) in the same or other computers (TechTarget, 2012). TAS uses a high class computer as a server, which manages all the processes of the network. Personal Computers Every staff member is provided with a latest personal computer. These computers contain all the necessary programs that are necessary for the business operations. Recommendations This section presents recommendations to improve the network security: Staff Training In order to improve the network security TAS must educate and train their staff members. The staff members must have knowledge of network security such as what is network security, why it is important and how should it be implemented. They should be provided with tips, guidelines and manuals. The staff must be trained regarding latest emerging security threats, viruses and their effects. They should also be trained regarding how to deal with these threats. Update Passwords Staff members should keep their username and password safe and do not share with any other person. They should regularly change their passwords and do not set their passwords as their names and data of birth as it is easy for others to make a guess. If a password is stolen then they must inform to IT centre so that a new password can be assigned to them. Update Antivirus Regularly The installation of a latest antivirus program is not enough until it is updated regularly. Without a doubt, new viruses and threats are emerging daily so an updated antivirus program will help deal with these latest security threats. Cloud based backup TAS can make use of the latest technology such as cloud computing as a backup support. It will improve the speed, quantity and quality of resources available to TAS (Dell, 2012). In this scenario, TAS can move its business data to a cloud, which is secure and affordable. References Dell. (2012). Cloud Computing. Retrieved January 12, 2013, from 2013: http://content.dell.com/us/en/gen/dell-cloud-computing Indiana University. (2012). What is a firewall? Retrieved January 10, 2013, from http://kb.iu.edu/data/aoru.html Kaminsky, A. (2012). What is Network Security? Retrieved January 14, 2013, from http://www.wisegeek.com/what-is-network-security.htm Laudon, K. C., & Laudon, J. P. (1999). Management Information Systems, Sixth Edition (6th ed.). New Jersey: Prentice Hall. Nash, J. (2000). Networking Essentials, MCSE Study Guide. California: IDG Books Worldwide, Inc. Norton, P. (2001). Introduction to Computers, Fourth Edition. Singapore: McGraw-Hill. Ray, R. (2004). Technology Solutions for Growing Businesses. New York: American Management Association (AMACOM). Rouse, M. (2007, May). Firewall. Retrieved January 10, 2013, from TechTarget.com: http://searchsecurity.techtarget.com/definition/firewall Rouse, M. (2007, July). Switch. Retrieved January 11, 2013, from TechTarget.com: http://searchtelecom.techtarget.com/definition/switch TechTarget. (2012). Server. Retrieved January 10, 2013, from http://whatis.techtarget.com/definition/server Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Security Essay Example | Topics and Well Written Essays - 1250 words - 1, n.d.)
Network Security Essay Example | Topics and Well Written Essays - 1250 words - 1. https://studentshare.org/information-technology/1791969-network-security
(Network Security Essay Example | Topics and Well Written Essays - 1250 Words - 1)
Network Security Essay Example | Topics and Well Written Essays - 1250 Words - 1. https://studentshare.org/information-technology/1791969-network-security.
“Network Security Essay Example | Topics and Well Written Essays - 1250 Words - 1”. https://studentshare.org/information-technology/1791969-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security

Networks and Security

Networks & security Customer Inserts His/Her Name Customer Inserts Grade Course Customer Inserts 17th April, 2012 Question 1 Confidentiality is the act of non-disclosure of information to unauthorized persons or individuals.... This mechanism is effective in ensuring security of the data sent is highly secured.... Random nonces are effective in providing adequate security especially when sending repeated messages over the same network.... The main purpose of random nonce is to provide encryption and data security for messages or records....
3 Pages (750 words) Assignment

Network Security Opening to the World

In addition to the usual features for conferencing, the product offers high security and privacy to the potential customers.... onfidentiality and AvailabilityTo protect against tapping and data security breaches during transmission, GoToMeeting offers 128 bit encryption of all meeting data, and enforce strong end user authentication procedures.... If the hardware and network lack necessary support features, internet based conferencing could be an effort in turmoil, and may cause loss of time, productivity, and revenue....
3 Pages (750 words) Essay

Exploring The Dark Side. Review of hacker sites

For example, the mentioned conference announcement is accompanied by a call for papers on network penetration, malware generation and, importantly, Network Security.... The implication here is that hackers are actively involved in the study of Network Security flaws, aspects of network vulnerability and information warfare strategies, as based on existent flawed security and suggest strategies for the resolution of these weaknesses and vulnerabilities.... Within the context of a network interconnected world where sensitive corporate data is stored, thereby potentially accessibly, on servers linked to the World Wide Web, security issues are a real and critical concern....
4 Pages (1000 words) Essay

The Issue of Network Security

It is common for hackers to target the computer network of a company; this may have significant negative impacts on the company Server Server Introduction With technological advancements, the issue of Network Security has become of significant concern.... Thus, Network Security is extremely essential in any company; the chief information officer should be aware of how to ensure Network Security.... Network Security: A Beginners Guide....
2 Pages (500 words) Essay

Email Security Issues

The increased and increasing usage of email in the world Email security Today, the world has turned around and most things are done electronically; the competitiveness of a business depends wholly on email technology.... mails that are not well protected can trigger threats to national security, especially in the event that sensitive information gets in the hands of terrorists.... Email security has gained remarkable significance, in the wake of the twenty first century....
2 Pages (500 words) Essay

Unauthorized Access to a Computer System and Defensible Networks

Question 2 A Defensive Network Architecture is an information planning for the Network Security system which is well maintained and controlled and very closely monitored to identify weaknesses in the system (McClure et al.... The Practice of Network Security Monitoring: Understanding Incident Detection and Response.... Hacking Exposed: Network Security Secrets and Solutions, McGraw Hill, CA,1999, p 3 – 28Shell, Petruske (2014) Cyberspace milestone reached for Air Force Network....
1 Pages (250 words) Assignment

Security consultant

A secured company network is that which has instituted a set of procedures to… Risk assessment is a proactive Network Security measure that serves to identify risks, threats, and vulnerabilities that could endanger the Network Risk Assessment Describe the purpose of a risk assessment, risk scope and identify critical areas for an assessment.... Risk assessment is a proactive Network Security measure that serves to identify risks, threats, and vulnerabilities that could endanger the integrity of company's operations....
2 Pages (500 words) Essay

The most important threat to network security

With the ever advancing technology, these parties have opted to embrace authentication as one way of securing their information against malicious internet… One thing that many people fail to take into consideration is that authentication itself is the most important threat in Network Security and we are just about to find out how in this study.... “Authentication is the process of determining whether someone or something is, Authentication is a Threat in Network Security Number) May 7, (Faculty) Authentication is a Threat in Network Security Network Security has risen to be a matter of prime concern to private network users, organizations and the military as well....
1 Pages (250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us