logo

Overview of Network Security

   

Added on  2022-12-30

4 Pages915 Words75 Views
Running head: OVERVIEW OF NETWORK SECURITY
OVERVIEW OF NETWORK SECURITY
Name of the Student
Name of the University
Author Note

OVERVIEW OF NETWORK SECURITY 1
Hi, everyone good morning / good afternoon. Today I am going to analyze the Security
Options for JKL company.
Slide 2: At present the company is facing some security related threats. The PC infections are
modified to spread crosswise over PCs. Much of the time, they are sent as email connections
or downloaded from novel site pages with the mean to contaminate organize gadgets by
utilizing frameworks on the system. In the event that an infection figures out how to infiltrate
JKL's PC organize, they can almost certainly debilitate the security settings, take individual
information, for example, passwords or even erase information put away on clients' drives.
PC infections are probably going to pick up passage into the organization's framework since
the organization's activities include numerous information exchanges between the two
destinations over the system. This makes a helpless escape clause on JKL's system as odds of
sending or downloading information containing an infection are high.
Slide 3: In the third I am going to discuss about the business requirements of JKL company.
JKL's business prerequisites regarding system security incorporate secure web portals which
will give amazing cloud security. JKL additionally needs an email security procedure. A
powerful email security technique should contain inventive risk observing capacities with
start to finish encryption. The cloud security procedure will relieve dangers at the IP and
DNS layers. Along these lines the organization will most likely safeguard against
ransomware and phishing a stage prior.
Slide 4: One of most dangerous security attacks is the Trojan horse attack. This assault
happens when the clients of a framework run a malevolent code which is taking cover behind
a real program. They are frequently spread through email and are exhibited as messages from
recognizable people. They are regularly spread through email and are displayed as messages
from commonplace people. In the wake of accessing the framework, the Trojan pony would

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Analyzing Security Options for JKL Company
|12
|841
|51

Overview of Network Security
|6
|1018
|98

Assignment on Risks and Risk Management
|11
|781
|13

Sample Assignment on Cryptolocker
|4
|1264
|163