Free Essay

Security Solutions

In: Computers and Technology

Submitted By jlarosa888
Words 948
Pages 4
Security Solutions
Jonathan E. La Rosa
July 22, 2014
NTC/411
Randal C. Shirley

Security Solutions Firewalls have been around for years. In that time, they have protected various different organizations and corporations from possible hacker attacks. They play a critical part in protecting the internal network and making sure that packets are screened and checked before being provided access. Although firewalls are extremely powerful, especially in today’s world, they cannot be the only source of protection that the network can have. Various other technologies need to be used in order to actually make sure that the data is secure and that information has not be tampered with. Intrusion Prevention Systems, or IPS’, as well as Intrusion Detection Systems, or IDS’ are great in making sure that the network is free of any attacker or unwanted individual. These different technologies working together can provide the best protection possible, although they do have to be monitored in order to make sure they are working in the best way possible.
Firewall Protection Managing firewalls is a fundamental function in making sure a network is secure. Network security managers are the main individuals who have to make sure that the firewall is constantly working in the most effective and efficient way possible. The rules that are in place within this device can and will affect the network and how it responds. Firewalls need to be constantly upgraded and put with the latest software in order to be effective. There are always individuals are work trying to get past firewalls and while they are able to get through most, patches and upgrades are provided to fill in the holes that these hackers expose. Without these upgrades, the firewall is vulnerable and easy to collapse. Different firewalls protect different sections and some of are either hardware based or software based. The network firewalls protect the entire network and are located just before the Internet gateway. These firewalls act like a gatekeeper to traffic that comes in through the internet. Rules and guidelines need to be set by the IT Managers and network security engineers in order to make sure that the right packets are not being blocked and that the correct ones are being sent to the correct departments or VLANs depending on how the actual network is set up. Hardware firewalls are physical devices, such as routers and switches that are interconnected on the actual network. Software firewalls are installed on servers and are usually more customizable to the demands of the network security engineer.
Intrusion Protection System Although firewalls are extremely powerful and helpful, a great complement to them is an Intrusion Protection System, or IPS for short. An IPS analyzes the network in order to calculate data movement and look out for malware that might have filtered its way in. Harmful traffic is never obvious and can conceal itself as standard data packets, therefore, an IPS can sort them out and alert to their existence before it is too late. An IPS uses various formats to actually filter out the data which include signature based findings, incongruity based detections and also protocol analysis. IPS’ are being adopted by many organizations in order to provide more support to the firewall in defending against harmful packets. The network of an ecommerce website is packed with various types of data and packets that are coming from the open internet. In this situation an IPS is highly recommended to work in correlation with the firewall as it can assist in preventing a possible unwanted intrusion.
Network Monitoring There should be a strong level of monitoring constantly going on with these systems. The infrastructure team needs to work hand in hand with the network operations team in order to make sure that individuals are trained and told what they need to do in order to prevent any possible issue in the future. The logs that are produced by these security devices help in protecting all of the private and confidential information that the business handles and therefore they need to be taught what they have to look for and what process to take if something were to arise. Policies and procedures would need to be created just for this role and it can be handled by multiple individuals on a rotating shift.
It is essential to constantly monitor the system to make sure that nothing wrong is going on. If the system is able to send alerts when an issue is found, it can be set to send e-mail alerts and create a ticket in order to work through the alerts and warnings. This too is another way that the management of the system can be handled. It allows specified individuals to be alerted in the moment that something happens and it also creates a ticket into the ticketing system helping track and document the adequately.
Real-Time Response Real-time response to an issue is one of the hardest goals to reach when dealing with network intrusions and packets filtering through. Many organizations are having difficulties actually reaching this goal and trying to get everything set up properly. When an issue happens, there has already been an effect, and therefore, any response is already after the fact. Viewing and maintaining a constant watch on the network making sure that all packets are trusted is going to require a full department and even then, most of the responses will always be reactive and not proactive. The response time will definitely be lowered as much as possible and help in getting it as close to immediate, but practice and making sure procedures are limited in errors is the best way to improve this metric.

Similar Documents

Premium Essay

Security Aircraft Solution

...Security weaknesses within an organizations system put the organizations assets at risk. After reading and viewing the infrastructure and architecture of AS, there are a few vulnerabilities that are very noticeable that would put their system at risk. The two evident areas are the vulnerabilities with the policy and the hardware. The first vulnerability apparent is the policy on updating the firewall and router rule sets. The security policy of AS, require that all firewalls and router rule sets are to be evaluated every two years. This is a lengthy amount of time to go without evaluating the rule sets. The intervals in the evaluation of the rule sets would put the organization at great risk for potential threats. The second vulnerability that is noticeable is that the backups are stored at the server location. This would put the company at great risk if there were ever some kind of disaster to occur. The security weaknesses mentioned above can be decreased with proper security controls. Vulnerabilities Hardware Vulnerabilities The hardware infrastructure of the AS Headquarters in San Diego, California had been identified during our recent security assessment as being a potential security weakness to the company's overall information systems security infrastructure. The system hardware infrastructure comprises of Five (5) Individual Servers One (1) Switch Two (2) Routers One (1) Firewall The hardware area of concern was the lack of Firewalls being used to protect...

Words: 2393 - Pages: 10

Premium Essay

Data Security Solutions

...Data Security Solutions Bitdefender Total Security 2015 combines impeccable protection with a strong range of features, including new profile settings to optimize your PC's resources. These days, a good security suite does a lot more than just detect and defend against malware. That's the idea behind Bitdefender Total Security 2015 ($70 for one PC, $90 for three PCs), which, in addition to top-notch protection, offers a collection of centralized PC tune-up and optimization tools to make computer maintenance as easy as possible. You'll also get one year of antivirus security for up to three PCs, and a protected browser for safe online shopping. Overall, Bitdefender Total Security remains our top pick. How I tested I installed Bitdefender Total Security 2015 on an Acer Aspire E5 laptop running Windows 8.1 with an Intel i5 processor, 4 GB of RAM and an 64-bit operating system. This is far from the most powerful machine on the market; I chose it so that any performance impact Bitdefender had on the computer could be detected. I also evaluated Bitdefender based on its setup and interface, security protection, and features and tools. Setup Bitdefender Total Security 2015 for PC is compatible with Windows XP and Vista, 7, 8 and 8.1. That's good news for people who still have yet to upgrade from Windows XP. After I downloaded the Bitdefender Total Security 2015 installer from Bitdefender's website, the product started an initial scan of our Acer E5, then proceeded to install...

Words: 1889 - Pages: 8

Premium Essay

Security Weakness for Aircraft Solutions

...Security Weakness for Aircraft Solutions Michelle Harris SE 571 Principles of Information Security and Privacy Keller School of Graduate Course Project – Phase 1 January 22, 2012 Introduction In this report I will provide a security assessment of Aircraft Solutions (AS), a well known and respected equipment and component fabrication company located in Southern California. In the assessment I will identify and evaluate potential weaknesses, possible threats, the likelihood of the threat occurring and the threat if exposed in three key potential areas. AS has a dedicated, trained workforce and maintains a large capacity plant and extensive equipment to meet customer requirements. AS provides full spectrum design and implementation solutions to multiple industries, including the electronics, aerospace, commercial, and defense sectors. Aircraft Solutions employs a range of highly qualified professionals and houses an immense production plant, with an overall goal of providing high-quality solutions to accommodate specifications from a wide range of customer demands. I will primarily focus on the assessment that will identify the existence of vulnerabilities present within the context of AS operations as it pertains to their hardware and software. Lastly, recognition of the consequences resulting from the unfolding of potential threats will be given due attention. Security Weakness In the three areas targeted for potential threats, hardware, software...

Words: 782 - Pages: 4

Premium Essay

Security Assessment for Aircraft Solutions

...Security Assessment for Aircraft Solutions Table of Contents Executive Summary 3 Company Overview 3 Security Vulnerabilities 4 Hardware Vulnerability – Absence of a Firewall 4 Policy Vulnerability – Lack of Timely Updates 5 Recommended Solutions 6 A Hardware Solution 6 Impact on Business Processes 9 A Policy Solution 9 Impact on Business Processes 10 Summary 10 References 12 Executive Summary This report will seek to evaluate and address security weaknesses with the Aircraft Solutions company. As security weaknesses are pointed out relating to hardware and policy weaknesses, recommendations will be made to Aircraft Solutions to be examined and hopefully implemented to improve IT security operations. Aircraft Solutions, located in Southern California, recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. In reviewing Aircraft Solutions and its operations, uncovered were security vulnerabilities. Two vulnerabilities that were evident were issues with a lack of firewalls and the current security policy in place that is reviewed only every two years. Recommendations have been made that made help to remedy these vulnerabilities through the use of virtualization and by changing the security policy to be evaluated semi-annually instead of every two...

Words: 2450 - Pages: 10

Free Essay

Security Assessment and Recommendations for Aircraft Solutions

...Security Assessment and Recommendations for Aircraft Solutions Principles of Information Security and Privacy Keller Submitted: December 11, 2013 Executive Summary The purpose of this report is to investigate the vulnerabilities of Aircraft Solutions (AS) in the areas of hardware and policy. Furthermore, it provides recommended solutions to the security weaknesses mentioned in Phase 1. Aircraft Solutions is a well known leader in the design and production of component products and services for companies ranging from commercial industry to the aerospace industry. In addition, Aircraft Solutions maintains a large capacity plant filled with an extensive variety of equipment, which is mostly automated alongside skilled specialists in a range of fields to ensure they meet their customers’ needs. The weaknesses that are being addressed are hardware and policy. Company Overview Aircraft Solutions is a leader in the planning and production of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The headquarters of Aircraft Solutions is located in San Diego, California. The goal of Aircraft Solutions is to use machined products and related services to supply customer success, and to achieve cost, quality, and schedule requisites. They have a Defense Division (DD) of Aircraft Solutions located in Orange County, California and a Commercial Division (CD) located in San Diego County, California. Aircraft...

Words: 1560 - Pages: 7

Premium Essay

Nt2580 Unit 6 Database Security Solutions

...Database Security Solutions Defined There are six different categories of solutions in the matrix above that align with your organization’s compliance and security objectives. • Discovery and Assessment locate where database vulnerabilities and critical data reside. • User Rights Management identifies excessive rights over sensitive data. • Monitoring and Blocking protect databases from attacks, unauthorized access, and theft of data. • Auditing helps demonstrate compliance with industry regulations. • Data Protection ensures data integrity and confidentiality. • Non-Technical Security instills and reinforces a culture of security awareness and preparedness. Discovery and Assessment Scan for Vulnerabilities: Understanding vulnerabilities that expose databases to input injection is essential....

Words: 458 - Pages: 2

Free Essay

Ntc 411 Week 5 Individual Security Solutions

...NTC 411 Week 5 Individual Security Solutions Get Tutorial by Clicking on the link below or Copy Paste Link in Your Browser https://hwguiders.com/downloads/ntc-411-week-5-individual-security-solutions/ For More Courses and Exams use this form ( http://hwguiders.com/contact-us/ ) Feel Free to Search your Class through Our Product Categories or From Our Search Bar (http://hwguiders.com/ ) Resources: SkillSoft (2012). CompTIA Network+ 2012: Network Security Part 3. Complete the Security Solutions Model module in Skillport. Attach a copy (screen shot) of the final test page to your assignment below. Scenario: Your boss wants to know how to detect an intrusion into or an attack on the ecommerce network. Your boss also wants to know what hardware or software should be procured for intrusion detection. Write a 2- to 3-page business report describing the hardware and/or software you believe should be considered for implementation. Include your reasoning for why the described hardware and/or software should be procured and implemented. Address the following questions raised by your boss: Does a properly installed and maintained firewall provide adequate defense against intrusion? What is an IPS and do we need one in an ecommerce network? Do we need a group of network personnel to monitor the ecommerce network for intrusions 24/7? Will any of this hardware or software facilitate a real-time response to an intrusion? Format your business report consistent with...

Words: 5062 - Pages: 21

Free Essay

Science

...Detailed Lesson Plan (Grade 7) 1. Objectives After providing the necessary materials, each student; 1.1 investigates the different types of solutions: -unsaturated -saturated -supersaturated 1.2 performs an actual activity about solubility. 1.3 values the common solutions that can be found at home and can be used in daily living. 1. Learning Tasks 2.1 Topic: Solutions 2.2 Concept: The unsaturated solution has a less amount of solute to be dissolved. The saturated solution can hold no more solute to be dissolved. The supersaturated solution cannot hold more solute. 2.3 Materials 2.3.1 Textbook/Other Reference -Science Grade 7: Matter (K-12 Curriculum), pages 1-16 - http://www.infoplease.com/encyclopedia/science/solution-heat-solution.html 2.3.2 Instructional Materials - video clips, materials enumerated for the experiment and activity sheet. 2. Methodology 3.1 Daily Activities 3.1.1 Prayer/ Greetings Christ Jesus Whom we open our eyes, may you be there; When we open our ears, may you be there; When we open our mouths, may you be there; When we open our diaries, may you be there. Help us to see with your eyes; Help us to hear with your ears; Help us to speak your truth in love; Help us to make time for you… for others… for ourselves. Amen. 3.1.2 Checking of Attendance 3.1.3 Checking of Assignment 3.2 Preparatory Activities 3.2.1 Review Teacher: Class...

Words: 1391 - Pages: 6

Free Essay

Lab Report

...Osmosis Introduction: Tissues are made up of cells that have the same structure and function. In this experiment osmosis will be measured in a piece of tissue. Water potential can be determined by the changes in dimensions of the tissues when it is placed in solutions of different concentrations. Research Question: What is the effect of sucrose solution on potato cells Hypothesis: Osmosis will increase when the solutions are less concentrated with sucrose Variables: Dependant: Osmosis Independent: Length Materials: 12 large test tubes or specimen tubes with bungs, marker pen, potato chip cutter, scalpel, fine forceps, 3 watch glasses or petri dishes, ruler, 6 labeled beakers one containing 50cm^3 of distilled water and other four containing 50cm^3 of 0.2 mol dm^-3, 0.4 mol dm^-3, 0.6 mol dm^-3 and 0.8 mol dm^-3. Method: 1- Using the potato chip cutter, cut 24 chips from the potato. Cut the chips into 5cm lengths using the scalpel. Be as accurate as possible. Place 4 chips into each of six, labeled test tubes, one test tube for each of the different sucrose solutions. Pour in enough of each respective solution to cover the potato tissue. Put a bung in each one of the test tubes and label this series “potato”. 2- Repeat the method using the apple fruit or turnip root, putting four chips of tissue 5cm long into each of the second series of test tubes. Label these tubes “apple” or “turnip”. 3- Leave the tubes for at least an hour 4- After at least...

Words: 604 - Pages: 3

Free Essay

Environement Polltuion

...FUNDAMENTALS OF SURFACE MODES: ¥ COLLOIDS ¥ means ÒglueÓ in Greek ¥ was coined in 1861 by Thomas Graham. ¥ ¥ ¥ ¥ ¥ WHAT IS A COLLOID? usually consists of two phases; one continuous phase in which the other phase is dispersed. Size of particles: larger than the size of molecules and small enough for the dispersed phase to stay suspended for a longer period of time. ¥ No strict boundaries for the size limits. OFFICIAL DEFINITION ¥ In 1903 Wolfgang Ostwald formulated the official definition of a colloid: ¥ a system containing entities having at least one length scale in between 1nm and 1µm. ¥ For smaller particles there is no distinct boundaries between the phases and the system is considered a solution; ¥ for larger entities the particles will fall to the bottom due to the gravitational force, and the phases are separated. 1 2 3 MESOSCOPIC PHYSICS ¥ The particle size is in the so-called mesoscopic range in between the macroscopic and microscopic limits. LARGE INTERFACIAL AREA ¥ One very important quality of the colloids is the large interfacial area between the dispersed and the continuous phases. WHAT EFFECTS HAS THIS? ¥ This means that interface effects and hence the electromagnetic surface modes, are very important for the properties of the colloids. ¥ It costs energy to create this much surface and the particles would clump together if this isnÕt prevented. ¥ Usually the particles are charged and hence repel each other. 5 6 4 Four states...

Words: 2895 - Pages: 12

Premium Essay

Poop

...encouraged to ask question/s that is related to this module and that you don’t know the answer to and want it to be answered. The question/s can be answered by anyone in class. The instructor will allow sometime for other students to answer the question/s before contributing. You can post your questions in MODULE 2 forum under the Discussion Forums. Complete Assignment #2. The assignments are posted in the ASSIGNMENTS area of the website. Even though the homework assignments are not to be turned in and graded, you are strongly encouraged to do them to understand the material and to prepare for quizzes and tests. A complete solution to this assignment will be posted on the course website under ASSIGNMENTS on Thursday (Sept 4th). You are encouraged to review the solutions and compare your work to the solution, ensuring that you understand the reasons the solutions appear as they do. You are also encouraged...

Words: 485 - Pages: 2

Free Essay

Speech 203

... * Has no secretary The most important problem would be catching the flight for the meeting in Chicago since it’s an emergency and work related. Solutions: Getting work done for the day on the air plane on the way to the meeting. Call the secretary to find out at least some of the info for the meeting. Item#2 Problems: * Internal politicking in the company * Finding someone to replace F.T. Dickenson * Dealing with eliminating his overtime hours The two most important problems would the politicking, because someone else may feel the same way and decide to leave the company too. Also, finding someone to replace him and do his unfinished work in such a short period of time. Solution: Search for a new employee ASAP. Item#3 Problems: * Workers threatening to walk out over a co-worker * 10 votes to dismiss Foreman Edward George The workers are the most important asset to the company, so their interest should be first. Second, you have to figure out what to do about the votes to dismiss Ed George. Solutions: Talk to Ed George about his problems with his co-workers. Hold a meeting and get even more workers involved in the voting process, the take another vote. Item#4 Problems: * Overloading which can result in interruption of electrical power. * Not being reachable for Southern Power Solution: Contact Southern Power ASAP. See if they could come out and help with the problem. Item#5 Problem: * Balancing your work and his until Wednesday ...

Words: 922 - Pages: 4

Free Essay

Snnsnjs

...Name Date Class COLLIGATIVE PROPERTIES OF SOLUTIONS Section Review Objectives • Identify the three colligative properties of solutions • Describe why the vapor pressure, freezing point, and boiling point of a solution differ from those properties of the pure solvent. Vocabulary • colligative properties • freezing-point depression • boiling-point elevation Part A Completion Use this completion exercise to check your understanding of the concepts and terms that are introduced in this section. Each blank can be completed with a term, short phrase, or number. In a solution, the effects of a nonvolatile _______ on the properties of the solvent are called _______. They include _______ point and vapor pressure _______, and boiling point _______. In each case, the magnitude of the effect is _______ proportional to the number of solute molecules or ions present in the _______. Colligative properties are a function of the number of solute _______ in solution. For example, one mole of sodium chloride produces _______ as many particles in solution as one mole of sucrose and, thus, will depress the freezing point of water _______ as much. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Part B True-False Classify each of these statements as always true, AT; sometimes true, ST; or never true, NT. 11. When added to 1000 g of water, 2 moles of a solute will increase the boiling point by...

Words: 483 - Pages: 2

Free Essay

Potato Osmolarity

... it increases the water movement out of the plant by a process called transpiration. When there is a shortage of water,  the guard cells well get smaller and close the stomata, and the transpiration process will move slower. The osmolarity would be tested with solute concentrations ranging from 0.0 M to 0.6 M.  The concentrations increased 0.1 M each time and the solute used was sucrose. The goal of this experiment was to determine which concentration had the least effect on the potato after being incubated. This information helped us estimate the osmolarity of the potato tuber tissue. Our group hypothesis is that the osmolarity of the potato will have the concentration with the 0.1 M solution. This hypothesis is based off the predicted outcome that smaller molarity concentrations will have the least effect on the potato.  The more solute added to a solution decreases the concentration of water in most cases (Kosinski).  The decrease in water concentration would then lead to a lower weight of the potato tuber once it has finished incubating. Methods & Materials: For experiment A you will need the following items: 1 large potato tuber  Forceps petri dish razor blade DI water metric ruler 7 250 mL beakers/ or disposable cups   balance that weighs to the nearest 0.01g   sucrose...

Words: 1866 - Pages: 8

Premium Essay

Abrasion Lab Report

... The purpose of the experiment was to see how abrasion works and how it affects rocks and minerals with the use of sugar cubes. I measured the mass of all 5 sugar cubes together then placed it in a jar with a lid on and shook it 20 times, as I was shaking the jar my lab partner recorded the mass that was taking with the number of times I shake the jar. After which we drew the shape of the sugar cubes when it was poured out on a paper, then we calculated the percent change. This procedure was repeated 5 times and with each trial the shaking time was increased by 20. After all the calculations was done, we graphed the data. After each trial the size and mass of the sugar cubes reduced, this was due to the pressure put on the jar as we were shaking it. Supposing little pressure was put on the jar, the outcome would have been different and would have shown little abrasion effects on minerals and rock so therefore this made me conclude that, for abrasion to have a greater impact on minerals and rocks the pressure of the water or wind must be strong to push the minerals against each other. Another factor that contributes to how abrasion works could be the amount of space the minerals and rocks have because during the experiment, the sugar cubes pumped into each other and the walls of the jar and since there wasn’t enough space for movement the sugar cubes weathered and reduce in size with the mass decreasing which I believe wouldn’t occur if there were to be enough space for the sugar...

Words: 462 - Pages: 2