Analyzing Security Options for JKL Company

   

Added on  2023-02-01

12 Pages841 Words51 Views
Analyzing Security
Options for JKL company
Student name
Professor’s name
Unit title
Analyzing Security Options for JKL Company_1
Security threats facing JKL Company
computer viruses-Computer viruses are programmed to spread across computers. In
most cases, they are sent as email attachments or downloaded from unique webpages
with the aim to infect network devices by using systems on the network [1]. If a virus
manages to penetrate JKL’s computer network, they can be able to disable the security
settings, steal personal data such as passwords or even delete data stored on users’
drives.
. Computer viruses are likely to gain entry into the company’s system since the
company’s operations involve multiple data transfers between the two sites over the
network. This creates a vulnerable loophole on JKL’s network as chances of sending or
downloading data containing a virus are high.
Analyzing Security Options for JKL Company_2
JKL’s business requirements
JKL’s business requirements in terms of network security include secure
internet gateways which will provide powerful cloud security
The cloud security strategy will mitigate threats at the IP and DNS
layers. This way the company will be able to defend against ransomware
and phishing a step earlier.
. JKL also needs an email security strategy. An effective email security
strategy should contain innovative threat monitoring capabilities with
end-to-end encryption.
Analyzing Security Options for JKL Company_3
Trojan horse attack
This attack occurs when the users of a system run a malicious code
which is hiding behind a legitimate program. They are often spread via
email and are presented as emails from familiar individuals.
They are often spread via email and are presented as emails from
familiar individuals. After gaining access to the system, the Trojan horse
can then record passwords and steal sensitive data. Collaboration and
communication of staff between the two sites promotes Trojan horse
attacks to spread on JKL’s network.
Analyzing Security Options for JKL Company_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Overview of Network Security
|6
|1018
|98

Overview of Network Security
|4
|915
|75

Analysis of Security Tools for JKL Company
|8
|1708
|98

Assignment on Risks and Risk Management
|11
|781
|13

Security Measures Against Trojan Horse Malware at Samsung Company
|6
|1259
|61

Security System for Pharmaceutical Industry: Risk Management and Recommendations
|21
|3937
|289