logo

Overview of Network Security

   

Added on  2023-01-04

6 Pages1018 Words98 Views
OVERVIEW OF NETWORK SECURITY
1
Analysis of security options for JKL Company
Student’s name
University
Date

OVERVIEW OF NETWORK SECURITY
2
Threats and vulnerabilities facing JKL Company
Computer viruses
This is programmed to spread to all computers. Computer viruses are typically spread
through email attachments or webpages that are downloaded on the internet. If virus got a
chance to penetrate into the network of the JKL Company, it may interfere with the security
settings and steal confidential data like passwords or even delete the data of the company that
are stored on the user drives.
Computer viruses may gain entry into the system of the company and since its
operations comprise of multiple data exchange over the two company sites on a network.
This would create loophole on company network because the chances of downloading data or
sending information are high.
Trojan attack
The attack happens when the system user executes a malicious code which hides behind a
good program. It is usually spread via emails by the attackers and cab seen as valid email by
other people.
Since Trojan attack is circulated via email, after entering the system, it may record
password and steal critical data of the organization. The communication and collaboration of
the JKL staff in its two sites encourage Trojan attacks that spread over the corporate network.
Business requirements of JKL Company
When it comes to securing the company network, the conditions involve a secure internet
gate that would ensure robust cloud security.
The security strategy would help in mitigating the vulnerability issues of the DNS and the
IP layers. Therefore the company would be able to itself from a ransomware attack.

OVERVIEW OF NETWORK SECURITY
3
The company also need to develop a strategy for securing emails, a suitable plan for email
is ensuring that end-to-encryption is guaranteed.
Security threats
Security tools that JKL Company may use to mitigate security issues
Nessus tool
Nessus is a vulnerability scanner that was created by Tenable Network Security.
Nessus is used to scan computers remotely and raises a concern when it discovers a
vulnerability that malevolent hackers may use to access computers that are connected to a
network. Currently, Nessus is among the trusted security tool that most of the organizations
in the world use to scan security issues and to also get a good standard for vulnerability
evaluation. Nessus is now neither free or an open source, it cost around $ 2,000 per year
(Coffey, Smith, Maglaras & Janicke, 2018).
Hydra tool
Hydra is a security tool that is used to detect, but it can be utilized in various
categories of situation that includes authentication based forms which are commonly applied
in web applications (Peng, Luo, Zhao, Cheng & Liu, 2018). When you require to carry out a
brute force attack, hydra tool is the best tool that will assist a lot.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Analyzing Security Options for JKL Company
|12
|841
|51

Overview of Network Security
|4
|915
|75

Analysis of Security Tools for JKL Company
|8
|1708
|98

ICT287 Computer Security: Planet of the Grapes
|14
|2703
|84

Risk Assurance Management Assignment 2022
|3
|437
|11

Security Measures Against Trojan Horse Malware at Samsung Company
|6
|1259
|61