You have been hired to develop a range of recommendations to ensure JL can fulfil current and future client requests. The employees are comfortable, and reluctant to change their current cyber security behaviour. Many of the employees believe that the company is functioning correctly and does not need a new cyber security operational model. JL’s manager is committed to addressing the cyber security issues and improving the culture of the workplace.
The manager has requested that you compile a small, succinct report addressing five (5) critical cyber security issues. In producing your solution, you should address the following requirements:
Businesses cannot pass by the benefits of modern innovations such as smartphones, laptops and cloud computing to their operations. Firms are enjoying a growth in mobility, return on investment and productivity at minimal expenses by using emerging technologies to store and manage their data. However, Security concerns are growing over the use of technologies in handling the data of companies. Company data is exposed to cyber-attacks, leaks or even loss in important data. As organizations embrace the modern technologies in their activities, they need to be aware of the risks they are exposed to when using the resources. Identifying the risks will help the management in developing security measures to mitigate the risks. The vulnerabilities if not checked may lead to losses or damage the reputation of the organization. A proper security measure needs to be arrived at by developing a strategy that guides cyber security experts in creating and installing the security measures. This will ensure all issues within the network are addressed (Pfaff et al, 2015).
JL Company looks to install mitigation measures to address its poorly secured network layout. The company has recently started selling online, and communicates with its clients through online services. The management at the firm also plans to add the number of staff in the firm creating a concern as to how users of the company’s network resources will interact and handle the firm’s data. The following is a report highlighting the solution that the company could consider to address their problems. After going through articles covering other industries facing similar challenges, I was able to find out a number of mitigation measures that can be incorporated within the network infrastructure to minimize cyber-attacks including; adding encryption steps to control gain of access to network resources, monitoring activities of users under a firm’s network and installing authentication procedures.
When developing a network security design, a step by step approach is used (Oppenheimer, 2010). The structured steps assist in covering the major concerns that form part of the security design. Security measures that have been created in an unstructured manner will fail in securing assets and may not meet the objectives of securing all the firm’s network resources and data. The process of designing a security solution can be broken into steps that will effectively guide one to execute a proper and successful security measure. The steps include; Identifying the network assets, analyzing the security risks, looking at the security requirements and tradeoffs, developing a security plan, coming up with a security policy and developing an implementation strategy.
When identifying network assets, the risks that expose the assets to sabotage or illegal gain of access are established. The consequences that are brought by the risks are also identified. Network assets include the operating systems running on the firm’s network devices, data and applications. It also includes the devices connected under the network like smartphones and personal computers plus the network data that is transferred among network users. JL Company has five employees all who access the firm’s network resources while working in the firm’s premises. Devices under the company’s network run on the latest windows operating system that is regularly upgraded. The organization’s laptops are however not installed with any security software, creating a loophole for malicious applications and websites to send spam messages to devices under the network through the internet. The company also relies on an old server to hold its data which malfunctions in the event of a power surge, limiting users to access the network resources in the event of this power surges leading to a drag in operations. The company’s confidential data is also stored without using cryptographic techniques, this exposes the data to access by unauthorized personnel.
The security risks are established next, this is done by conducting an analysis on any threats from unauthorized persons who take advantage of the unskilled personnel using the company’s network. The intruders can alter the data or create denial of service to the network resources for staff members or steal company data. JL Company is especially exposed to this kind of attack since all their staff members are not skilled in securing their network resources and data. Most are experiencing spam messages daily and the company has even been exposed to a ransom ware attack before. This are examples of attacks from intruders when they penetrate a network. The employees can gain access to each other’s email accounts and personal computers which is also intruding into the privacy of staff members. The company also does not encrypt the data stored and transferred within their network. This creates a threat for intruders to gain access to the data. Proper security measures should be put in place to check this vulnerabilities.
The step that follows next, is analyzing the security requirements and tradeoffs. The mitigation measures that will be put in place should have specific objectives and the cost of protecting the company’s data and network should be less than the expense of recovering the data if a threat occurs. The security measures should protect assets including; data confidentiality, restricting access only to permitted users, data integrity ,allowing only authorized users to modify data, plus data and system availability to ensure users have uninterrupted access to network components. JL Company’s network and data requires a security measure that will reduce the exposure of its data to third parties and control how the information is transferred within the company’s network. Also, the privacy of user’s while accessing the internet should be addressed to reduce malware attacks and spam messages.
A security plan is created next. This is a documentation that contains high-level detail of the company’s strategy in meeting the security requirements. The document contains the people, resources and tools needed to meet the implementation of the security requirements. Based on the company’s network assets and threats, cyber security experts develop a plan that will be relevant to the organization even in future. JL Company needs to create a plan that will include the network services that they will use such as email and wireless technologies and the network topology of the users connected within their network framework. Management needs to include the special administrators that will be added to the team to ensure the security of the network is established. They should also include the ways in which managers and all users will be involved to ensure data and network resources are secure. A successful security plan for the company will need to be supported by all staff members.
A formal statement containing the rules that users of the company’s network resources and company data must follow is known as a security policy (Cisco Systems, 2018). The policy directs managers, users plus the network administrators on the way they should conduct themselves when accessing and using company resources in the work premises. JL Company runs without a security policy. The employees at the company are not aware of the best ways to utilize resources and conform to ideal cyber security behaviors. For example, an employee recently inserted a flash drive they had picked from the car park into one of the company’s machines. This led to a virus attack that created a malfunction in the operating system of the affected device. If security policies that limit users from using removable gadgets within the company’s network had been put in place, the incident would not have happened. Security policies have several items including; an access policy highlighting the access privileges and rights for the network users, an accountability policy defining the responsibilities of the network users. The policy needs to include the accountability of damage in the event of a risk occurring through users’ negligence. The policy should also state how incidents are handled in the event of an attack, the personnel to contact and the actions to be taken. An authentication policy should also be included that defines guidelines for authenticating access to network resources within the premises or remotely (Watson, Woodruff, Neumann, Moore, Anderson, Chisnall & Murdoch, 2015)
The following are typical ingredients that can be included to boost the security of the network design for JL Company. The first step is to physically secure their network infrastructure and physical devices. This involves restricting access to primary network resources by ensuring they are kept in a locked room away from natural or human made disasters (Openheimer, 2010). The server, routers, switches and other devices connected within the firm’s network need to be installed in a safe environment avoiding misuse by unskilled staff members or unauthorized access by third parties who might alter the running configurations leading to problems. Authentication procedures should also be added to control gain of access to the network resources. The authenticating processes enables administrators to identify the person requesting network services. Users under the company’s network should all have a login ID and password that are authenticated by a security server (White. Fisch, & Pooch, 2017).To improve security, the one-time password systems can be implemented which requires users to change their passwords from time to time. This would be especially beneficial in securing JL company’s data seen as the administrator password has never been changed since its installation. Authorization measures should also be incorporated to regulate the actions of the authorized users in accessing the company’s network resources. This allows the company’s management to grant privileges to users and processes within their network system. When implementing authorization as a security measure, the network should be designed such that users have only the required minimum rights to access resources that will enable them to carry out their tasks. For JL Company, this would reduce the illegal access of personal emails and data among staff members, improving privacy and confidentiality of data (Perlman, Kaufman & Speciner, 2016).Users of the network also need to be trained through programs that warn them on the risks of carelessly using network resources, devices and applications, plus the risks of poor password practices (Shan & Liao, 2016)). Most of the security breaches that occur within JL Company are as a result of human errors (Xie, Hu, Fang,Li, & Liu, 2016). The company’s staff members are even reluctant to change their behaviors to improve cyber security, this is because most are ignorant of the risks brought by insecure network systems. Training them would be beneficial to both the company and the staff members. Another option is acquiring cloud computing services from vendors selling this service. This provides a platform for the company to back-up their data and would not loss important data in the event of a damage to their primary server (Layton, 2016).
The company will have to spend a substantial amount of capital in laying down a proper security measure to meet the risks it faces (Steinberg, 2011). New infrastructure such as servers, routers and latest software and antiviruses will need to be purchased and installed within the organization’s network layout. Some of these infrastructure are costly and may even require the management of JL Company to spend more in hiring experts to install, configure and maintain them. Acquiring cloud services from external vendors to back- up their data will also mean the management has to incur extra expenses in maintaining the service (Sandberg, Amin & Johansson, 2015).
JL Company might choose to install a security measure that is already in existence by borrowing from another organization. Most firm’s handling a big amount of data have already implemented mitigation measures that secure their information and network resources. It would be easier for the management at JL Company to simply incorporate similar security measures to this firms as their solutions are already running reducing the risks of errors and failure. However, security measures are different and an approach implemented by one firm may not suit another company. JL Company will need to review their operations to come up with their own alternative that best works for them (Yang, Wang, Geraci, Elkashlan, Yuan & Renzo, 2015).
The management at JL Company is facing a crisis in managing its network resources. Risks of data loss, intrusion into the company’s network by third parties and unregulated access of network resources and data, expose the company’s assets to attacks. The firm needs to create a strong security measure to cover its network infrastructure. Developing a step by step approach in designing a security measure will surely assist the company to come up with the best alternative that covers majority of the risks (Pathan, 2016).
Cisco Systems. (2018). Five Steps to Securing Your Wireless LAN. Retrieved from Cisco Systems: https://www.cisco.com/c/dam/global/sv_se/assets/pdfs/smb/cdccont_0900aecd804909a5.pdf
Layton, T. P. (2016). Information Security: Design, implementation, measurement, and compliance. Auerbach Publications.
Openheimer, P. (2010, October 4). Security Mechanisms. Retrieved from Cisco: https://www.ciscopress.com/articles/article.asp?p=1626588&seqNum=2
Oppenheimer, P. (2010). Network Security Design. Retrieved from Cisco: https://www.ciscopress.com/articles/article.asp?p=1626588
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press.
Perlman, R., Kaufman, C., & Speciner, M. (2016). Network security: private communication in a public world. Pearson Education India.
Sandberg, H., Amin, S., & Johansson, K. H. (2015). Cyberphysical security in networked control systems: An introduction to the issue. IEEE Control Systems, 35(1), 20-23.
Shan, Z., & Liao, B. (2016). Design and Implementation of A Network Security Management System. arXiv preprint arXiv:1609.00099.
Steinberg, S. (2011, July 7). 10 Ways to Keep IT Systems Secure. Retrieved from Entrepreneur: https://www.entrepreneur.com/article/219954.
Watson, R. N., Woodruff, J., Neumann, P. G., Moore, S. W., Anderson, J., Chisnall, D., ... & Murdoch, S. J. (2015, May). Cheri: A hybrid capability-system architecture for scalable software compartmentalization. In 2015 IEEE Symposium on Security and Privacy (pp. 20-37). IEEE.
White, G. B., Fisch, E. A., & Pooch, U. W. (2017). Computer system and network security. CRC press.
Xie, J., Hu, K., Fang, P., Li, G., & Liu, B. (2016, December). Design and implementation of the platform for collection and analysis of the Inpatient Medical Record Home Page of Traditional Chinese Medicine. In Bioinformatics and Biomedicine (BIBM), 2016 IEEE International Conference on(pp. 1399-1402). IEEE.
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., & Di Renzo, M. (2015). Safeguarding 5G wireless communication networks using physical layer security. IEEE Communications Magazine, 53(4), 20-27.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Computer Security. Retrieved from https://myassignmenthelp.com/free-samples/431-computer-security/network-security-design.html.
"Computer Security." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/431-computer-security/network-security-design.html.
My Assignment Help (2021) Computer Security [Online]. Available from: https://myassignmenthelp.com/free-samples/431-computer-security/network-security-design.html
[Accessed 11 April 2021].
My Assignment Help. 'Computer Security' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/431-computer-security/network-security-design.html> accessed 11 April 2021.
My Assignment Help. Computer Security [Internet]. My Assignment Help. 2021 [cited 11 April 2021]. Available from: https://myassignmenthelp.com/free-samples/431-computer-security/network-security-design.html.
MyAssignmenthelp.com has been recognized as the safest dissertation help company in Australia. We conduct a rigorous interview process to select most experienced and talented dissertation experts. This is how, we fulfill students search can someone do my dissertation perfectly or who can write my dissertation plagiarism free and provide them needed academic assistance. Apart from writing help. we also provide dissertation editing services to help students submit perfectly written dissertation.
Answer: The implemented program is a product in a shop hhaving a particular quantity in stock, minimum stock level, and when this is reached it indicates that the product needs to be reordered and a reorder amount.The class product is designed to model a product where by it has the following attributes which are defined as varibles in the product class. String name- which is the name of the product int quantity- which...
Read MoreAnswer: Bigelow et al. (2015) opined that memory management is one of the big issues in fundamental programming. Though, it's an important aspect to manage memory in the programming environment using C++ [1]. Lakhotia, Harman and Gross (2013) stated that smart pointers are the class objects which look as well as feel like pointer, but they are smarter [2]. This report is designed to explain the use of C++ language in memory manage...
Read MoreAnswer Introduction The internet has moved on by many a miles over the past years. People now use the internet from various devices that range from desktop computers, laptops, tablets and smartphones. Responsive web design or RWD is one of the most commonly used web designing approaches in the modern technological era (Mohammad & Tomberg, 2013). Through this approach only one website interface is designed and it is meant to suffice the ne...
Read MoreAnswer: Number of movements ; New Zealand ; Short-term Visitors arriving ; Number of movements ; New Caledonia ; Short-term Visitors arriving ; Number of movements ; Papua New Guinea ; Short-term Visitors arriving ; Number of movements ; Vanuatu ; Short-term Visitors arriving ; Number of movements ; Fiji ; Short-term Visitors arriving ; Number of movements ; O...
Read MoreAnswer: In this assignment, a program to find the shortest path from source to destination node using a Dijkstra algorithm. The program is implemented with the Java programming language. This program gives the best output for the shortest path from the all nodes. Compilation To get the program running, before run the program set the path in Java. Run this program in command prompts. The path set command is set path =”C:\Prog...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
Omg they’re doing very good I got 100 from 100 ???? thank you so much for your help you saved me
Australia
the writer did a good job but live chat is not working for my exam, so it waste some time
Australia
This solutions has been escalated & reworked 4 time, and has cause me lots of delays and time to submitting my final work to my professor. I hope this does not happen again. I am your regular and loyal customer, please do not do this again. I am ...
Australia
Excellent work ..I will keep in touch with my future work. Really appreciate all your effort . So far so good. thanks again.
Australia