Saturday, May 11, 2019

Network security Essay Example | Topics and Well Written Essays - 1250 words

Network security - Essay frameworkThis business firm is emerging as a huge business set-up with a head office set(p) in New York. In the past few years, TAS has got massive popularity and now it has 10 stores in the area. The round of TAS comprises more than 500 people. In order to connect its varied stores the business has implemented a abundant area mesh (WAN). However, the internal activities are performed by apply local area profits (LAN), which is effected by using cables and other hardware devices. The implementation of this network has brought a number of advantages and improvements to business, however in order to run its business operations effectively the firm has implemented an effective security mechanism. The firm has mixed a wide variety of security techniques to improve its network security. In this scenario, the business uses different security techniques to condition the maximum security of its network. This paper discusses some of the important aspects ass ociated with its network security. ... In addition, the absence seizure of a network security can create many security challenges for a firm for pattern a competitor or a hacker can gain access to private or vital information, which can destroy the entire business or personal information related to a specific system or data loss. In this scenario, an organization can implement effective network security when its employees and staff members have knowledge of network security. In simple words, in an attempt to ensure effective network security system users must follow organizations security guidelines (Kaminsky, 2012 Ray, 2004 Laudon & Laudon, 1999). jockstraps Shack (TAS) makes use of a wide variety of security techniques to ensure the security of its network and business data. Some of the important techniques are outlined below Username and Password Based Access severally employee is provided with a username and a password which they use in order to access and use the system. Fo r this purpose, they have an IT Centre, which is prudent for determining the access type for the organizations employees. Firewalls A firewall can be implemented in both hardware and software format as they are designed to stop illegal access to or from a private network. In addition, firewalls stop illegal Internet users from accessing private networks connected to the Internet, in particular intranets (Indiana University, 2012 Rouse, 2007). Since the different stores of the Athletes Shack (TAS) are connected using the Internet so they have implemented firewalls to secure their computers and network. Antivirus Software An anti-virus program stops viruses from entering into the computer network. In this scenario, TAS is using the latest version of Avira Antivirus1 that is very

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.