StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Management: Writting 4 Snort - Assignment Example

Cite this document
Summary
Fratto argues that chief executives who are frantic to compose their quarterly figures may verge into new enterprises or discover ways to cut back costs without having to worry about the effects of poor data security. The article asserts that it is commonplace for supervisory…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Network Management: Writting Assignment 4 Snort
Read Text Preview

Extract of sample "Network Management: Writting 4 Snort"

Network Management: Writing Assignment 4 Snort Network Management: Writing Assignment 4 Snort Overview Fratto argues that chief executives who are frantic to compose their quarterly figures may verge into new enterprises or discover ways to cut back costs without having to worry about the effects of poor data security. The article asserts that it is commonplace for supervisory compliance and financial pressure to come up in businesses’ yearly surveys as prominent items. Fratto was still surprised to some extent by the figure of respondents finding it hard to determine ways to evaluate the risks integral in the diverse types of cloud computing.

As a result, Fratto contends that compliance is the key purpose of risk management programs, which makes compliance, linked to internal fiscal appraisals, the leading determinant of success (Fratto, 2009). Being aware of the location of data is preliminary to securing it since location data have considerable legal consequences. Evaluating cloud security is hard and constant. Providers of cloud security tend to ask their clients to trust the methods of processing and data handling devoid of a tool for confirming the security whether this trust is guaranteed.

In spite of financial tensions, organizations continue to finance compliance initiatives since their hands are tied. Past regulatory compliance, national and state legislations also impact cloud and the data security budgets. Intrusion notification legislations do not inform organizations on ways to secure their data. Instead, these laws need organizations to inform their clients on any losses of data they have made. The article concludes that the main trouble with rights management is the nonexistence of standard setups and interfaces among solutions and operating systems to oversee rights evenly (Fratto, 2009).

My Viewpoint The viewpoint that I chose is the application of similar privacy requirements by all cloud security providers and users. Fratto wrote, “Whether your sensitive data is in your own data center, in a cloud service, or replicated between the two, the same privacy requirements apply” (Fratto, 2009). I am on board with this viewpoint since I am aware of the same employment and financing barriers that organizations with proficient cloud and computing security deal with today. The same organizations concentrate on overseeing risk and securing data.

As Fratto puts it, these firms are aware of their “appetite for risk” and they oversee it instead of considering security a checklist of prerequisites (Fratto, 2009). This viewpoint makes data security providers realize that they cannot secure everything with certainty. As a result, putting the vital assets and the possibility of loss, and setting up programs and measures for security is the best course of action. I am impressed with this viewpoint the most since it serves as a solution to the critical problem the article presents.

The solution is prioritizing one’s risk requisites and finding out which actions should be assumed to secure one’s data. One then determines the innovation, tool, or protocols required to alleviate the risk (Fratto, 2009). This viewpoint enhanced my understanding about security and management to the extent that I can point out the exact requirements for securing delicate data internally. I also learned about questions that are more vital that I ought to pose when attempting to solve the company’s problem with cloud security.

ReferencesFratto, M. (2009). Whats Your Appetite For Risk? InformationWeek, Jun 22, pg. 25-33.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Management: Writting Assignment 4 Snort”, n.d.)
Network Management: Writting Assignment 4 Snort. Retrieved from https://studentshare.org/information-technology/1690653-network-management-writting-assignment-4-snort
(Network Management: Writting Assignment 4 Snort)
Network Management: Writting Assignment 4 Snort. https://studentshare.org/information-technology/1690653-network-management-writting-assignment-4-snort.
“Network Management: Writting Assignment 4 Snort”, n.d. https://studentshare.org/information-technology/1690653-network-management-writting-assignment-4-snort.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Management: Writting Assignment 4 Snort

Personal SWOT and Goal Exercise

Furthermore, they put you through a long probation before you start earning a salary commensurate To be a project manager and utilize my abilities in a reputable organization that will enable me learn, grow and further my skills and knowledge in Engineering, Business, and management.... The goal is essential in the timely realization of my dreams, goals and ambitions in being a successful corporate executive in the energy management multinational.... In addition, it will help me launch my consultancy business in matters of energy efficiency and project management in engineering....
3 Pages (750 words) Assignment

Network communications

network is a connection between one or more computers with other computers or even other systems, which can provide connection to more computers or just create new network within existent one.... There are nodes and servers in a network.... Servers provide possibility for working of a… According to one classification based on the location of a network we can distinguish LANs, WANs, CANs and MANs.... All these networks can be created within some location, for instance LANs network Issues and their functioning DeVry This paper was prepared for CEIS-100 taught by name....
2 Pages (500 words) Assignment

Network Management: Lab 3

On the other hand application network management Number: Lecturer: This paper discusses the lessons learned from the ial on firewall ial.... For example application of ACL on inbound traffic at the internal router on fa/00 implies that traffic going into the client network is affected.... For example application of ACL on inbound traffic at the internal router on fa/00 implies that traffic going into the client network is affected.... On the other hand application of ACL on outbound traffic means those that are into the router and not into the client's network....
1 Pages (250 words) Assignment

Differences between a VPN Router and a VPN Server

In this regard, it is essential that Z must require sending information to Administrative management Domain (ADMD).... These differences are notable relating to the case of Cisco VPN concentrator.... In this regard, it is eminent that VPN router supports the devices like computers, smart phones, tablets and others to VPN… Cisco VPN router requires to install VPN clients on each of the above stated devices....
4 Pages (1000 words) Assignment

Digital Telecommunications and Networks

Following is the list of extra features and functionalities that makes Intelligent Hubs more popular over other types of hubs:• It supports SNMP (Simple network management Protocol) through which we can access this hub and monitor its uptime and downtime in case of any power failure.... In Figure 1, we assume that there are four departments and each department's node is attached to a separate Intelligent Hub in order to implement the VLAN and ensure better management of the users....
8 Pages (2000 words) Assignment

Network Management Structure

… Network ManagementDefinition: network management consists of different aspects of network monitoring and control.... A network management system performs among other things the task/service of configuration of the network, guaranteeing its proper Network ManagementDefinition: network management consists of different aspects of network monitoring and control.... A network management system performs among other things the task/service of configuration of the network, guaranteeing its proper functioning, maintenance, security control, collection and archiving of data and fault diagnosis....
6 Pages (1500 words) Assignment

Computer Networking Analysis

… 12/04/2008IntroductionA computer network is a connection of more than one computer; this is done in order to share the files.... Any device that is connected to the network is called a node.... Networks are categorized depending on its purposes and 12/04/2008IntroductionA computer network is a connection of more than one computer; this is done in order to share the files.... Any device that is connected to the network is called a node....
7 Pages (1750 words) Assignment

Network Access Control

The fact that technologies in place such as vulnerability and patch management systems provide reactive mechanisms to keep systems up-to date.... This project will look at the goals of network access control in addressing security; we will look at policy enforcement, mitigation of zero day attacks and identity and access management.... … network access controlWith growth of technology, it is almost impossible today for business enterprises to face real system threats via malicious access, poor configuration or misuse....
2 Pages (500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us