logo

Analysis of Security Tools for JKL Company

   

Added on  2023-01-04

8 Pages1708 Words98 Views
An analysis of Security
tools that JKL Company
can use
STUDENT NAME
PROFESSOR’S NAME
UNIT TITLE
INSTITUTION
Analysis of Security Tools for JKL Company_1
JKL Company
JKL Company is a small business offering software developing services to its
clients. Currently, the firm is experiencing problems of maintaining stringent
security measures on its network. With two different sites, one in Adelaide and
the other in Brisbane, employees are forced to implement collaborative
practices to successfully complete creating any software.
Communication among employees daily is necessary for tasks to be carried
out properly and efficiently. The users on both sites are growing concerned on
the security of their network. They are raising issues on the privacy of their
data while using the company network resources and network security
concerns. JKL, just like most companies that connect their computers and
systems that are remotely distributed, faces a greater potential for cyber-
attacks. A single client problem may spread across to everyone on the network.
Analysis of Security Tools for JKL Company_2
Security Threats facing JKL Company
The company is facing several security threats in its network plan. Among the most concerning is the
risk of a Trojan horse attack.
A Trojan horse attack happens when the clients on the network run a malicious program hiding behind
a legitimate code. In most instances Trojan horse attacks originate from a familiar source under the
network, probably a user downloading and installing unverified applications [1]. The malicious
application then spreads across the network via email. The Trojan horse then steals sensitive data and
records passwords. Networking between JKL employees in the two different sites looks to enhance the
spread of Trojan horse attacks in the company’s system.
Another security concern for JKL Company is Inadequate IT security management. With the users
spread across two remote sites, the company might lack enough professionals to adequately manage
the network. Even with the best security solutions, the system may still miss critical cyber security
alerts leading to successful threats not being eliminated in time to reduce the impact. Another
security threat that JKL Company faces is unpatched security vulnerabilities. The company faces “zero
day” exploits. These are the unrecognized exploits with security in systems and programs and have
never been experienced by anyone previously. Zero day exploits become a threat if known
vulnerabilities remain unpatched.
Analysis of Security Tools for JKL Company_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Analyzing Security Options for JKL Company
|12
|841
|51

Overview of Network Security
|6
|1018
|98

Overview of Network Security
|4
|915
|75

Assignment on Risks and Risk Management
|11
|781
|13

Cyber Security Attacks and Techniques
|14
|1105
|277

Trojan Horse Attack
|11
|2804
|324