logo

The Importance of Network Security and the Implementation of Security Measures

   

Added on  2022-05-17

17 Pages6330 Words26 Views
Access to Higher Education Diploma
Assignment Brief
Access to HE Diploma (Computing)
Student Name Submission deadline date
Course/
Subject Title
Access to HE - Assignment 3
Computing
Submission date
Unit Title/Code Unit 6 - Computer Networks
Tutor Name Resubmission deadline date
Date set Resubmission date
This is all my own work and all sources have been acknowledged and attributed.
Student signature:
Assignment Brief
Assignment 3
The second Assignment is a 750word Report about the importance of network security and the
implementation of security measures to make a network more secure based on your practical experiments.
Choose one of the three scenarios discussed in the lesson (see below) for ILO 4 (4.1 4.2 4.3).
3.1 explain services provided by network systems, including directory services, communication services, file services and
application services
4.1 discuss the potential business risks that can arise as a result of an insecure computer network
4.2 evaluate a computer network scenario and proposed a range of measures that can be taken to secure the described
computer network
4.3 carry out measures to implement security features on a provided network
Small and medium business scenario

We have 5 desktop computers in the ground floor office with the printer which can send fax and scan/copy
documents. We have colleagues using their own laptops and mobile phones to reach the office documents
via network (Internet). They can connect to the office’s wireless network too. The office have 20 Mbps
Internet connection. There are permanent and temporary employees working for us. The office is being
cleaned during the night or early morning.
Task:
Identify at least 3 potential risks regarding the computer system and network (5 for merit)
Recommend/implement at least 3 security solution in order to protect the network (5 m)
Recommend changes, development to improve security (Distinction)

The Bournemouth and Poole College
Access to Higher Education – Computing
Unit 6: Web Development
Assignment 3
Heba Haskale
Submitted on: 18/05/21
Word Count: 750
Content
2

1.0 Introduction...............................................................................................................................5
2.0 Services Provided by Network System.......................................................................................5
2.1 Directory services..................................................................................................................5
2.2 Communication services........................................................................................................6
2.3 File services............................................................................................................................7
2.4 Application services...............................................................................................................8
3 Network Security.........................................................................................................................10
4 Risks and Threats.........................................................................................................................10
4.1 Unauthorized Wireless Access.............................................................................................11
4.2 Viruses.................................................................................................................................11
4.4 Lost or Stolen devices..........................................................................................................12
4.5 Untrusted or Disgruntled employees:..................................................................................12
5 Security Solutions to Protect the Network..................................................................................12
5.1 Antivirus:..............................................................................................................................12
5.2 Firewalls:..............................................................................................................................12
5.3 Proxy:...................................................................................................................................13
5.4 Employee’s education:.........................................................................................................13
5.5 Access control:.....................................................................................................................13
5.6 Connected devices:..............................................................................................................13
5.7 Disgruntled employees:.......................................................................................................14
6 Recommend development to improve security..........................................................................14
1. Using CCTV cameras................................................................................................................14
2. Entering and leaving................................................................................................................14
3. Standardize Software...............................................................................................................14
4. Preventative measures against ransomware, viruses, or loosing data....................................14
5. Ways to help defend against hacking attacks include:.............................................................14
6. Provide employees with security training................................................................................15
7.0 Conclusion...............................................................................................................................15
Bibliography.........................................................................................................................................16
Appendices..........................................................................................................................................17
Appendix A – Different Types of Viruses........................................................................................17
Appendix B – Tools to Protect Websites........................................................................................17
Table of Tables
3

Table 1: Directory services explanation.................................................................................5
Table 2: Communication services explanation.......................................................................6
Table 1: File services explanation ............................................................................7
Table 4: Application services explanation..................................................................8
1.0 Introduction
Network security is a key in the computer world today. Prevention is the key
word, and to have that prevention we will need to look into all the possible
scenarios of risks and their solutions.
4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Data communications – Edinburgh Zoo PDF
|22
|4290
|27

IT Networking- Assignment
|34
|1269
|35

a simple computer networks
|24
|6368
|26

Report | Wireless Networking System
|22
|2857
|48

Assignment on Wireless Network Security
|19
|2483
|61

Assignment On Implements Technological 2022
|62
|17151
|26