Verified Document

Network Security And Security Research Paper

Network Security Systems for Accounting Firm Vulnerabilities Assessment

In the contemporary IT environment, the implementation of the IT tools has become an effective strategy that organizations employ to achieve competitive market advantages. In other words, the IT tools have become an effective strategy that organizations can employ to be ahead of competitors, and be first in the market. One of the crucial features of the information systems is the network connectivity that involves connecting global computer resources, which assist in enhancing effective communication systems. Thus, the network connectivity will improve the communication system for our accounting firm assisting our organization to serve the customer better.

Despite benefits that network connectivity will provide to our organization, the network connectivity is associated with inherent risks and vulnerabilities. Typically, the network systems face different vulnerabilities that include virus attacks, electronic fraud, attacks from malware, Dos attacks and electronic eavesdropping. Since our organization will depend on the network system to transfer sensitive data across the network systems, the attackers can take the advantage of the network connectivity to steal the data creating the problems for our company. Moreover, the attacker can use the malicious software to get access into our system and cause immense damage. Malicious software refers to software inserted to the system to carry out the harmful purpose. A virus is an example of malicious software that can be used to infect the systems and having the ability to modify themselves. A worm is another example of malicious software having ability to perform unwanted functions. (Oliveira, Laranjeiro, & Vieira, 2015).

Our system also faces the risks of the Dos (denial of service) and DDoS (distributed denial of service) attacks with the goal of making the network resources non-available to the legitimate users. (Soryal, & Saadawi, 2014).The attackers will be able to achieve their goals by sending the useless packets to overload the machine thus preventing the users from achieving their legitimate objectives. The malware is one of the strategies that the attackers use to flood the network system with useless packets. After the malware is installed in the system, the attackers will use the malware to scan the system to identify the vulnerabilities before launching the attacks. (Black, Fong, Okun, et al.2007).

The attackers can also gain access to our system if the firewall is misconfigured. The attackers can penetrate into our network systems through this loophole. Additional methods that can cause vulnerabilities in our systems are through:

• Misconfigured software or hardware

• Inherent...

For example, we could lose a lot of financial resources if we fail to secure our systems. For example, an attacker can take the advantage of the vulnerabilities to steal sensitive data from our system. An attacker can steal our IT (intellectual property) and sell it on the open market making our company lose a large amount of money put in the investment. A reputation loss is another problem that we can face if we fail to secure our system. This issue can lead to a market loss consequently leading to a loss of competitive market disadvantages. We can also face legal problem from the clients if we fail to secure their data.
Attackers can also modify some of our data making them non-useful to the legitimate users. If we allow our data to be modified because of lack of protection, we will face a risk of making wrong business decisions that can lower our profitability. Another security threat against our system is the natural disaster that includes tornado, fire, flood, earthquake, landslide, volcanic eruption, and other natural disasters. These type of threats cannot be stopped because they are natural occurrences. If we fail to implement a plan to protect our business from natural disasters, our business can stand still due to the loss of data. Given different types of vulnerabilities that our company can face with the network system, it is critical to secure our network systems to prevent our company becoming a victim of attackers. The next section discusses different strategies that can be employed to protect our network systems.

Network System Security Recommendations

The network security is essential to enhance confidentiality, integrity and…

Sources used in this document:
Reference

Black, P.E. Fong, E. Okun, V. et al.(2007). Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0. NIST. Special Publication 500-269.

Mell, P. & Grance, T. (2011). The NIST Definition of Cloud Computing (NIST SP 800-145). National Institute of Standards and Technology (NIST).

Oliveira, R.A., Laranjeiro, N., & Vieira, M. (2015). Assessing the security of web service frameworks against Denial of Service attacks. Journal of Systems and Software. 109: 18-21.

Stallings, W. (2013). Cryptography and Network Security: Principles and Practice (6th Edition). Pearson Education.
Cite this Document:
Copy Bibliography Citation

Related Documents

Network Security
Words: 1437 Length: 4 Document Type: Case Study

Network Security for a Medium Sized Company: Network security is an important component for all companies including small and medium sized firms because very few businesses can operate without a network of computers. The network of computers facilitates improved communication in order for the company to improve its profitability or productivity. However, the improved communication between computers is also associated with some inherent risks such as malware and unauthorized access. The

Network Security
Words: 3307 Length: 10 Document Type: Research Paper

Network Security: Past, Present and Future The work of Curtin (2007) states that a network is defined as "any set of interlinking lines resembling a net, a network of roads -- an interconnected system, a network of alliances." Quite simply a computer network is a system of computers that are interconnected. There are seven layers of communication types identified by the International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model

Network Security the Practice of
Words: 1551 Length: 5 Document Type: Term Paper

Conclusion The purpose of this discussion was to examine the network security measures that are available. The research found that the proper configuration provides the first line of defense as it relates to securing a network. In addition, firewalls serve an essential role in securing networks against outside intrusions. The research also indicates that anti-virus software, encryption software and biometrics allow organizations to secure networks in a more comprehensive manner. There are

Network Security
Words: 3486 Length: 8 Document Type: Term Paper

Network Security History and Evolution of Network Security: The term 'Network Security' refers to the concept of the creation of a 'secure platform' based upon which the user of the computer or of a program within the computer are allowed to perform only those specific tasks that are allowed within the parameters dictated by the security network of the computer, and banned from performing those that are not allowed. The tasks include

Network Security: Opening to the
Words: 575 Length: 2 Document Type: Term Paper

The main lesson learned from viewing the tutorials and programs is the ease and flexibility of configuring each specific session to the unique needs of an audience. Feasibly these technologies could be used for creating highly unique and tailored learning experiences for students who were learning through online universities only for example. The ability to tailor all forms of digital content, from music and video to drawing boards and

Network Security As an Issues for Business Data Communication
Words: 1631 Length: 5 Document Type: Term Paper

Network Security: An Issue for Business Data Communication Computer security and the protection of data has been an issue since the early 1980s when computers became standard office equipment. Company sensitive information is stored on computers. Protecting the access to and integrity of this information has been a key concern for managers and computer specialists alike. The issues in data security have not changed, however the advent of the Internet has

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now