Premium Essay

Networking and Security Issues

In:

Submitted By topgunraj
Words 5140
Pages 21
IT for Decision Makers

NETWORKING AND SECURITY ISSUES

Handout 1 Overview

Introduction

Many organizations have invested vast amount of money in computer networks, only to find out that although it is providing means of improving the efficiency and productivity of the organization but it also exposes the Organization to possible attacks and threats. Such attacks have been the most challenging issue for most network administrators and a worrying topic for administrators.

Organizations need to share services resources and information but they still need to protect these from people who should not have access to them, while at the same time making those resources available to authorized users. Effective security achieves these goals.

The greatest threat to computer systems and their information comes from humans, through actions that are either malicious or ignorant. When the action is malicious, some motivation or goal is generally behind the attack. For instance, the goal could be to disrupt normal business operations, thereby denying data availability and production.

April 13, 2000, 3:55 P.M. Pacific time: The Web site for the Motion Pictures Association of America (MPAA) is suffering intermittent outages, and the organization suspects computer vandals are to blame. A source inside the organization, who asked not to be identified, said that the MPAA is currently “experiencing problems with their public Web site, and they suspect a denial-of-service attack.” The attack was first rumored on http://www.hackernews.com/, a Web site for news on computer hacking.

Most of the attacks are becoming more frequent and more damaging, and they are using well-known techniques and methods to exploit vulnerability in security policies and systems.

1. Network system.
Before we move to the security part, lets take a few minutes on what a Network system

Similar Documents

Premium Essay

Social Networking in Business and Human Resources

...Social Networking in Business and Human Resources Rebecca Moriarty Troy University Introduction to Information Systems IS 3300 XTIB Dr. Rodger Morrison February 27, 2011 With the growth and explosion of popularity of the internet in the recent past, there has been a significant increase in the use of social networking sites. More than ever people and businesses are now using the internet with the purpose of having access to social networking sites. It is in these sites that they are able to set up networks with their friends, co-workers and family from all over the world and be able to share their thoughts and ideas on virtually everything spanning from personal issues to work and business advertising. Social networking sites have therefore become a subject that is drawing a lot of research from all over the academic world. In the recent past it has become difficult for people working in human resources departments to avoid the distractions that are being introduced with the rampant use of social networking sites. In the world today millions of people are now subscribed to the providers of the social networking services such as Facebook, MySpace, LinkedIn, and Friendster among many others. The main activities that go on in these sites are online discussions about the common happenings in life, discussions about various interests, organizing of various events, making friends, talking about politics or mere gossip sharing activities (Jackson, 2003)...

Words: 2300 - Pages: 10

Premium Essay

Sample Business Information Systems Business Plan

...Phoenix BIS 220 June 15, 2014   Table of Contents 1.0 Executive Summary 4 1.1 Mission Statement 4 1.2 The Market 4 1.3 The Offering 5 1.4 Competition 5 1.5 Business Information Systems Resource Requirements 5 1.6 Business Information Systems Key Issues 5 2.0 The Business Information Systems Enterprise 5 2.2 Organization 5 3.0 Business Information Systems Selection 5 3.1 (What are the BIS you selected for your business? Why did you select these BIS systems? (Please provide 5 BIS systems. I.e. Point of Sales, Online ordering, Enterprise Resource Planning (ERP) etc…)) 6 4.0 Networking Technology Selection 6 4.1 (What is/are the networking technology system? Why did you select this/these networking technology systems? (Please provide at least 1 Networking Technology. I.e. Website Hosting (who will host your site), Internet Service Provider (identify bandwidth speed), Wireless capabilities, etc…)) 6 5.0 Business Information Systems and Networking Security Risk and Mitigation 6 5.1 (What are the security risks for the BIS selection?) 7 5.2 (What are the security risks for the Networking Technology selection?) 7 6.0 Business Cost Analysis (OPTIONAL) (BONUS POINTS) 7 6.1 (How much does it cost for the BIS and Networking Technologies you selected for your business?) 7 6.2 (How would you go about in obtaining funding for your business?) 7 6.3 (Provide a One-Year, Two-Year, and Five-Year projected investment capital. I.e. initial funding, Return on Investment, Anticipated...

Words: 832 - Pages: 4

Premium Essay

Test

...Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure...

Words: 2305 - Pages: 10

Premium Essay

Locating Topics of Interest

...NORTHCENTRAL UNIVERSITY ASSIGNMENT COVER SHEET Learner: Terry L Green THIS FORM MUST BE COMPLETELY FILLED IN Please Follow These Procedures: If requested by your mentor, use an assignment cover sheet as the first page of the word processor file. The assignment header should include the Learner’s last name, first initial, course code, dash, and assignment number (DoeJXXX0000-1) justified to the left and the page number justified to the right. Keep a Photocopy or Electronic Copy of Your Assignments: You may need to re-submit assignments if your mentor has indicated that you may or must do so. Academic Integrity: All work submitted in each course must be the Learner’s own. This includes all assignments, exams, term papers, and other projects required by the faculty mentor. The known submission of another person’s work represented as that of the Learner’s without properly citing the source of the work will be considered plagiarism and will result in an unsatisfactory grade for the work submitted or for the entire course, and may result in academic dismissal. | | BTM8102-8 | Kris Iyer, PhD | | | Business Research Methodology | GreenTBTM8102-2 | | | <Add Learner comments here> ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Faculty Use Only ------------------------------------------------- <Faculty comments here> ...

Words: 2699 - Pages: 11

Free Essay

Social Networking

...Information Systems Course Project Four Case Study Social Networking 1. Facebook, MySpace, and LinkedIn are using disruptive technology to run their business. Disruptive technology is a new way of doing things that initially does not meet the needs of existing customers. Disruptive technology tends to open new markets, and enter into the low end of the markets to displace high end competition. Sustaining technologies tend to build on established markets that provide cars that gain better gas mileage or faster cars, as well as cheaper products. MySpace allows users to interact in a way unparallel before its emergence. Facebook has surpassed MySpace as far as active users. Facebook has many features, but it is its chat feature, one that populates a friends list that has surpassed the features of America Onlines’ Instant Message. LinkedIn is geared for the professional or business orientated as opposed to Facebook and MySpace that are geared to finding and keeping in touch with friends and family. LinkedIn members invite people to be connections instead of friends. LinkedIn is a contact management system as well as a social network, and has a question-answer section similar to Yahoo Answers. LinkedIn is a site to network for future positions. Develop your profile to show case your skills in hope of a network “connection.” 2. Some business challenges facing social networking sites are remaining innovated and security issues. Business Driven Technology text relates that the first...

Words: 824 - Pages: 4

Free Essay

Comparison Matrix

...version: Fedora |Components |Your response | |Role of shell |Gives a command line with built in commands | |Three features and roles of each |Security-there is a firewall tool provided with a task bar that lets the user know of any | |feature |security issues. Shell- Is environment friendly for the user and has functions that run like | | |a PC. Rescue-This feature which is in the disk of the program, can unlock a system to let the| | |user continue their work. | |Comments on security |This is a main important feature for the OS | |Comments on administration |It is easy for ADMIN use and the tools are not as difficult | |Comments on networking |Networking is ok even though the security firewall is good | |Comments on performance |Neat and clean | |Comments on programmability |The functions are easier to navigate for the programming. | |Other...

Words: 446 - Pages: 2

Premium Essay

Computer Network Security for Social Networking

...Computer Network Security for Social Networking McCray C. Devin Undergraduate Business, Leadership, Information System Technology Security Regent University 1000 Regent University dr. Virginia Beach, VA 23464 e-mail: devimcc@mail.regent.edu Abstract In this paper, I will address the security issues, flaws, and problems that social networking sites are faced with in retrospect to information that the sites hold. The Information is not protected from the public in any way, why is this a normal operation about the popular social media sites. Lastly I want to address the simplicity of gaining someone vital information through a protected individual’s social network profile. 1. Introduction In today’s society almost everyone has some type of social networking service that they hold an account with. These social networking sites are a great way to communicate, network, and interact with fellow colligates and friends. Facebook, Twitter, and Google plus are just a few social networking sites to mention. These sites all have a one factor authentication system for the user to log into their account (Beaver) .This simplistic authentication systems is very easy and efficient for the users accessing there accounts. The idea arose if it is this easy for me to log into my account how easy would it be for an outside party to gain access within my account. Companies are faced with the problem of convenience over security. (McCHale 12) In this paper I would like to address...

Words: 2048 - Pages: 9

Premium Essay

Social Media

...Social Networks and their impact on Availability, Confidentiality and Integrity Musa Ramadhani Davenport University IAAS 667 - Legal and Ethical Security Topics Deanne Cranford-Wesley Table of Contents Abstract 3 Introduction 4 Problem Statement 7 Literature Review 8 Findings 11 Military Families 12 Identifying your social media users 16 Common myths about Social Media 17 Data leakage and non-disclosure 17 Social Media Squatting 18 A new generation of hackers 18 The high cost of inaction 19 Harm to brand reputation 19 Lost productivity 19 Strains on bandwidth 20 Implementing effective Practices 20 Recommendations 21 Creating an Account 21 General Recommendations 22 Conclusion 26 References 28 Abstract Social networking sites spread information faster than any other media. Over 50% of people learn about breaking news on social media. 65% of traditional media reporters and editors use sites like Facebook and LinkedIn for story research, and 52% use Twitter. Social networking sites are the top news source for 27.8% of Americans, ranking close to newspapers (28.8%) and above radio (18.8%) and other print publications (6%). Twitter and YouTube users reported the July 20, 2012 Aurora, CO theater shooting before news crews could arrive on the scene, and the Red Cross urged witnesses to tell family members they were safe via social media outlets. In the same breath one could argue that social media enables...

Words: 6827 - Pages: 28

Premium Essay

Advance Networking Technology

...Title |Advance Computer Networking | Question 1. What does computer networking accomplish? 2. How does networking improve the usefulness of computers? 3. What are the drawbacks of networking computers? 4. What is the future of networking computers? 5. Is computer networking still at infancy, Discuss? Question 1: What does computer networking accomplish? Computer networking is the interconnection of two or more computers to share resources. Computer networking has evolved beyond the sharing of resources; it allows people and machines to communicate, using some of the advanced features or services. Computer networking has brought about increased productivity, cost reduction and synergy between users. Other accomplishments of the computer networks include: • File sharing and management: One of the major accomplishments of computer networking is file sharing, which includes remote file accessing. Organizations or individuals can share documents irrespective of their location provided their PCs are interconnected. It saves time, and provides a more efficient means of transferring data, rather than using storage device to copy and transport data to the other user. • Resource sharing and management: Another important achievement of computer networking is resource sharing. All computers in a network can...

Words: 3610 - Pages: 15

Premium Essay

Effects of Social Networking

...SETA survey of representatives in Tribunal cases 2008 t Research Paper Workplaces and Social Networking The Implications for Employment Relations ns Ref: 11/11 2000 1 0 Andrea Broughton, Tom Higgins, Ben Hicks and Annette Cox (The Institute for Employment Studies) For any further information on this study, or other aspects of the Acas Research and Evaluation programme, please telephone 020 7210 3673 or email research@acas.org.uk Acas research publications can be found at www.acas.org.uk/researchpapers ISBN 978-1-908370-07-5 Workplaces and Social Networking The Implications for Employment Relations Andrea Broughton Tom Higgins Ben Hicks Annette Cox Prepared for Acas by: Institute for Employment Studies Sovereign House Church Street Brighton BN1 1UJ UK T: 01273 763400 F: 01273 763401 www.employment-studies.co.uk Copyright © 2009 Acas The Institute for Employment Studies The Institute for Employment Studies is an independent, apolitical, international centre of research and consultancy in public employment policy and organisational human resource issues. It works closely with employers in the manufacturing, service and public sectors, government departments, agencies, and professional and employee bodies. For 40 years the Institute has been a focus of knowledge and practical experience in employment and training policy, the operation of labour markets, and human resource planning and development. IES is a not-for-profit organisation which has over...

Words: 16924 - Pages: 68

Premium Essay

Company the Google

...Introduction Social networking sites have become very popular avenues for people to communicate with family, friends and colleagues from around the corner or across the globe. While there can be benefits from the collaborative, distributed approaches promoted by responsible use of social networking sites, there are information security and privacy concerns. The volume and accessibility of personal information available on social networking sites have attracted malicious people who seek to exploit this information. The same technologies that invite user participation also make the sites easier to infect with malware that can shut down an organization’s networks, or keystroke loggers that can steal credentials. Common social networking risks such as spear phishing, social engineering, spoofing, and web application attacks attempt to steal a person’s identity. Such attacks are often successful due to the assumption of being in a trusting environment social networks create. Security and privacy related to social networking sites are fundamentally behavioral issues, not technology issues. The more information a person posts, the more information becomes available for a potential compromise by those with malicious intentions. People who provide private, sensitive or confidential information about themselves or other people, whether wittingly or unwittingly, pose a higher risk to themselves and others. Information such as a person’s social security number, street address, phone number...

Words: 3272 - Pages: 14

Premium Essay

Pci Compliance Issues in Networking

...PCI Compliance Issues in Networking Various answers to networking issues in compliance Professor Dr. Kenneth Flick Sherri A Lohse October 19, 2013 Abstract PCI 9 specification that deal with issues in computer networking and handle real situations thatr have coded and specific networking solutions in order to handle issues in networking that relate to PCI specifications of employing firewalls, internet protocols, acceptable bandwidths, capacity and scalability levels, levels of security. Part One Retail Shopping and Purchase of Goods with Credit/Debit Monetary Instruments Event One You visit a retailer you know and enjoy. You shop around with the mind to purchase several clothes or merchandise you determine after shopping most of the day you like to check out at a POS point of sale register. The PCI compliance and standards which are also the HIPAA standards and compliancy as well as other Market compliant POS compliance rules and regulations have a certain order of logic, organizational strength and apparent administrative rules and rights to their business functions within their daily tasks for their retail shop or POS terminal. PCI compliance and standards will show and regulate the POS, point of sale terminal with appropriate tags and prices, while the POS machine at the register will determine what’s available, what is left, how...

Words: 1454 - Pages: 6

Premium Essay

Effects of Media

...Griffyn Carpenter 4/24/15 Media Ethics- Final Paper Prof. Ceravolo Ethical Issues within Social Media Sites: The Past, The Present, and The Future Social media came onto the scene in a huge manner with hype that hasn’t been matched since but with that huge hype that it brought, it brought along some problems as well, problems that social media users are still anxiously waiting to be fixed. Social media has grown so rapidly that network executives and engineers have had a hard time keeping media websites up to par with the expectations of the public and keeping people interested as well as making sure they are updating security features too. The lack of care for other people’s personal information it feels like in a sense, have created a few current and potentially fatal future problems for these social networking sites. Unfair and/or undefined privacy laws, the hacking of user profiles, and the lack of technological advancement used within sites by website personnel all pose threats for some social media sites now and as time progresses. The actions they choose to put in play now and over the next few weeks, months, and years will determine how successful some certain sites are and how long we can expect their media presence to play on. Privacy is a state where in an individual can have his/her information in seclusion, resulting in a selective revelation of one’s identity and information and which they choose to reveal it. Privacy can also mean “anonymity” in case...

Words: 2850 - Pages: 12

Premium Essay

Open Source Software

...Open Source Software Open source refers to any software whose source code is made available free (not on a fee or licensing basis as in e-business) for any 3rd party to review and modify. In other words it is open and accessible to all. It continuously develops free products by bringing together thousands of dedicated volunteers from around the world. Start-up companies taking advantage of Web 3.0 Start preparing by developing IT systems, hiring talent and restructuring the organisation to take advantage of Web 3.0. At organisational level, start with capacity building and at technical level, by adopting open systems and moving real-time rather than asynchronous model. Ensure that the business has got the right skills. There is already a huge demand for data scientists who are able to work with large chunks of data to find meaningful information. Create an online dialogue about company products and services for customers. Capture information produced, and use it to refine products, services and marketing. Key recommendations include: ▫ Open up business systems to the internet ▫ Move to real-time analytics and processing ▫ Structure data so it can be used more effectively ▫ Develop internal web and data talent ▫ Involve customers in all parts of the business through social media. Increasingly the customization of content presented will be based on a solid user profile refine that can be stored on the computer of his own or resorting to other entities that provide...

Words: 1652 - Pages: 7

Free Essay

Setting Up Home Network

...Setting up a Home Network Srikanth Gunda Wilmington University 1. Overview of wireless networking technology There are various types of wireless network which are wireless Local Area Network (WLAN), Wireless personal Area Network (WPAN), Wireless mesh Network. Wireless networks are convenient in home network, small schools and offices. Wireless network are basically suitable to interconnect cell phones and computers, printers, TVs which helps in easy communication. Wireless network uses radio frequency rather than wire to communicate. Clients unite their gadgets which helps to communicate Wireless access points. The speed is relative to distance between the transmitter and receiver due to the utilization of radio frequency; consequently, the closer the client is to the transmitter the more the speed is. 2. Advantages of wireless networking technology Wireless networking technology gives various benefits to the household and office use, some of these benefits are below:- I. Most of the working class families have few computers which are arranged in various rooms. It is expensive, and time-consuming to introduce cables to a network that are situated in rooms which helps them to impart the broadband communication hence a wireless router resolves the issue. II. As the clients stay in the coverage of the signal, he/she can move their gadgets easily around the house. This protects hours of cable reconnection as the gadgets can get web by long wireless facility...

Words: 667 - Pages: 3