Saturday, February 15, 2020

Network Security Essay Example | Topics and Well Written Essays - 1000 words

Network Security - Essay Example (Petersen and Davie, 2012; C?etinkaya et al, 2010) 2. 0 Overview of Network Fundamentals, Security Threats, and Issues The simplest form of a computer network is a pair of computers connected with each other by the means of an Ethernet cable, Bluetooth, etc. However, we generally see complex networks involving several. The basic hardware requirements to develop a computer network involve network adapters, network hubs and switches, routers and access points, modems, and network cables. Modern corporate networks use wireless router and access points, which accommodate both wired Ethernet connectivity for desktop PCs and wireless connections for mobile devices and notebook computers. (Petersen and Davie, 2012) Regarding security threats and issues, we must understand that recently the hackers are aiming corporate information, media centers, and other kinds of different information security systems. CEOs and CIOs at organizations are facing unforeseen challenges like email bombardment, spamming, denial of service, and distributed denial of service attacks. Moreover, protection of the systems and networks from spyware, malware, viruses, etc. is an imperative particularly when they are connected to a public inter-network. (Andress, 2011, C?etinkaya et al, 2010) 3. ... The firewall sets up a kind of filter when the internal network of the company is connected to a public network. (Zwicky et al, 2000) VPN is the abbreviation of Virtual Private Network. It is a kind of private data network which â€Å"makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures† (VPNC, 2008). It operates independently of the public network (e.g. Internet) and has customized access control and dedicated network operating system at the server side. 3.2 Recommendations for Firewalls and VPNs A firewall must spotlight Internet security and support filtering the diverse websites, programs and applications run on the Web, and scrutinize threats during surfing. It should also accept/reject the Remote Desktop Protocol (RDP) client requests and control the Remote Assistance Services (RAS). Also, Mueller (2011, p. 7-130) has stated that â€Å"Users install third party firewalls and virus p rotection products in many cases, so you’ll also need to consider these third party products as part of an overall application strategy.† According to the experts at VPN Consortium, the major rationale of a VPN is to provide the company with the similar facilities as privately held leased lines can provide. Additionally, technologists are striving to keep VPN technology cheaper and simpler without making considerable usage of public infrastructure through sharing or cloud computing. Telephone companies have commercially offered privately shared network resources through technology services like VoIP, mail servers, database integration, etc. throughout the last decade. However, a VPN makes it feasible to have

Sunday, February 2, 2020

Business Ethics Current Event Article Example | Topics and Well Written Essays - 250 words - 1

Business Ethics Current Event - Article Example ng the extent and nature of wrongdoing, anonymous incident reporting, assessment of social media reputation, employee surveys, group discussion, tone of management communication, exit interviews, facility interviews, customer complaints, and interviews and focus groups. Tone at the top creates the basis for a culture that motivates confidence and trust among all the key stakeholders of the company (Epps, 2012). The information from the event is related to what was discussed in the class. Strategic management of individuals at the top is crucial for the success of the company. When measuring performance, the top management should be able to distinguish between the different divisions of a company. It is important to note that managers usually perform well despite the poor performance of a business unit due to factors that beyond the control of the manager (Maher, Stickney, and Weil, 2012). Legal and ethical compliance is crucial in developing the social responsibility image of the company. Legal compliance entails the extent to which the company conforms to a number of laws such as the state, federal, local, and international laws. On the other hand, ethical compliance relates to the level to which the members of the company follow the general legal and ethical standards of behavior (Griffin, 2011). In conclusion, the tone of the top management is important in determining company’s success. It also determines how the company complies with various programs. Thus, it is important to develop ways through the tone at the top can be assessed. As stated before, the compliance professionals can assist each other in evaluating the tone at the top through various methods. For instance, methods such as anonymous incident reporting, assessment of social media reputation, employee surveys, group discussion, tone of management communication, and exit interviews. Thus, the information from the event is related to some of the topics discussed in the class such as strategic top