Security Security is essential to maintain a functioning network and productive employees. These security recommendations should be implemented to ensure a safe and secure operating network where there are minimal fears from outside influences such as viruses, spam and hacking activities. An electronic workplace policy will be implemented to protect the network from within. All employees are required to follow the electronic workplace policy which states that they are not to install any unauthorized software or hardware on company equipment.
Violations of the electronic workplace policy will be grounds for disciplinary action leading to termination of employment. This is a necessary tactic used to ensure business equipment is used for business and not for personal pleasure or personal business. To protect this size of a network from viruses and worms, there will be an email and file extension filtering program that scans through the Los Angeles central location. The product we recommend is created by Symantec. It is the corporate edition product which allows the freedom from user input.
The closed loop automation process allows the detection of new and existing viruses and worms, and the removal of these viruses and worms. The definition file will be updated on a daily basis and will happen at an optimum time where the network usage is at its daily low. There is also an automatic quarantine for files which have become infected and a secure transmission back to Symantec for analysis. This virus protection software will be implemented through a silent install to all users across the network. As for spam attacks, we recommend F-Prot solution for this major problem. F-Prot provides full email scanning and up to date definition files for known spammers.
The Essay on Myths and Misconceptions about Viruses and Security
Computer viruses, as they are commonly known today, are malicious malware design to destroy and distort the normal working of a computer. The first known origin of computer viruses is estimated to be in the 1960’s CITATION Nat14 l 1033 (Devotta, 2014). The virus was in form of a game called Core Wars, and would self-replicate every time it was run. The group of programmers who developed it also ...
This type of software will eliminate the unwanted emails for all of the networks users. The product will automatically update spam / virus signatures and quarantine these problems. There is also a need for protection from hackers. There is state of the art software program and tools to prevent malicious attacks on your network.
We recommend the solution from NFR Security. The Sentivist solution protects against Denial of Service (DoS), Intrusions, Malicious Code, Command Tampering, Backdoor and Buffer Overflow attacks. There is a real threat to a network everyday and this program will protect your multi city network. We will protect the network both LAN and WAN by installing a firewall and web monitoring software called Websense. The firewall will protect the network. Network protection via the firewall will include stateful packet inspection, which inspects the header information carried in each packet but also, it will also examine the contents of the packet all the way to the application layer.
The firewall admin will have the ability to implement rules to ensure network integrity through the firewall. The firewall will also control the user’s access to the outside World Wide Web and also filter content with Websense. The Websense product will prohibit company users from viewing objectionable material through our network. This product is customizable to fit the business goals and will be maintained by the information security staff. The IS staff will be able to monitor and run reports on Websense activity and gather information weekly status reports for managements review. This product is to ensure the employees are safe from questionable material on websites where automatic downloads and browser hi-jacks can and do occur.
The Term Paper on Network VPN and Web Security Cryptography
Securing Internet commercial transactions and sensitive banking data is increasingly becoming critical as threats to computer networks continue to cause significant financial losses resulting from data damage, loss or corruption by spy ware, viruses and other data corrupting hostile codes (Mogollon, 2007). The consequences of having weak security system administration become enormous and companies ...
As far as outgoing traffic to the World Wide Web, we will be using technology called network address translation to broadcast one IP address. This is important because network address translation protects and hides the users IP addresses behind the firewall and help eliminate the possible hacking attacks by IP address. Netting the IP addresses will also allow the admin staff to use multiple IP addresses inside the network the without worry of IP conflicts both internally and externally. There is a need for a gateway which can direct traffic for all network hacking attempts. Using an intrusion detection system (IDS), we can route this hacker type traffic to a location off of the network.
This location will serve as a honey pot for the hacker. It is designed to fool the hacker into thinking they are actually attacking a live network full of servers and clients, while in reality, we will be gathering information on the hacking attempt like trace routes and possible locations. This will give an edge to our security staff in locating and prosecuting these illegal activities. Security is a major concern in today’s information technology world. The purpose of these recommendations is to save the company time and money by implementing the most up to date software programs for network protection. Resources web retrieved on March 10, 2005 web retrieved on March 10, 2005 web retrieved on March 10, 2005.