HND Computing Unit 5: IT Security Report on Risks and Implementation
VerifiedAdded on 2023/02/01
|18
|1181
|61
Report
AI Summary
This report delves into the realm of IT security, focusing on various aspects crucial for organizational protection. It begins by evaluating different types of security risks, including computer viruses, malware, and DOS/DDOS attacks, emphasizing their potential impact. The report then examines orga...
Read More
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

IT SECURITY
LO 1 & LO 2
LO 1 & LO 2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

TABLE OF CONTENTS
■ INTRODUCTION
■ LO1
■ P1 Evaluating the types of security risks to organization
■ P2 Examining the organizational security procedure
■ LO2
■ P3 Potential impact of IT security with respect to the incorrect configuration of firewall
policies and third party VPN
■ P4 Implementation of DMZ, Static IP and NAT in a network
■ CONCLUSION
■ INTRODUCTION
■ LO1
■ P1 Evaluating the types of security risks to organization
■ P2 Examining the organizational security procedure
■ LO2
■ P3 Potential impact of IT security with respect to the incorrect configuration of firewall
policies and third party VPN
■ P4 Implementation of DMZ, Static IP and NAT in a network
■ CONCLUSION

INTRODUCTION
■ IT security is a set of cyber-security strategies that prevents unauthorised access to
organizational assets which includes computer, network and data.
■ IT security mainly maintains the integrity and confidentiality of sensitive information,
blocking the access to sophisticated hackers.
■ IT security is a set of cyber-security strategies that prevents unauthorised access to
organizational assets which includes computer, network and data.
■ IT security mainly maintains the integrity and confidentiality of sensitive information,
blocking the access to sophisticated hackers.

P1 Evaluating the types of security risks to
organization
■ Security risk to the system is generally performed by the unauthorised
users in order to gain access of the confidential data for the purpose of
attempting cyber-attack.
■ This is a illegal practice which is mostly performed by the cyber
criminals with the intention of stealing the private data from the retail
organization in London.
organization
■ Security risk to the system is generally performed by the unauthorised
users in order to gain access of the confidential data for the purpose of
attempting cyber-attack.
■ This is a illegal practice which is mostly performed by the cyber
criminals with the intention of stealing the private data from the retail
organization in London.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

CONTINUE…..
Different types of security risks are as follows:
■ Computer Virus
■ Malware
■ Trojan Horse
■ DOS and DDOS attacks
■ Computer worm
Different types of security risks are as follows:
■ Computer Virus
■ Malware
■ Trojan Horse
■ DOS and DDOS attacks
■ Computer worm

CONTINUE…..
Computer Virus
■ This is a small piece of software which is mainly designed to infect, corrupt, steal or
delete the data from the system. This can be easily spread from one computer system to
another in it uses the computer programs such as emails and messages to attack the
system. Viruses are also known as Spam messages.
Malware
■ It is termed as a Malicious software which can be created through the variety of forms
such as hostile, intrusive or annoying software program codes and software.
Computer Virus
■ This is a small piece of software which is mainly designed to infect, corrupt, steal or
delete the data from the system. This can be easily spread from one computer system to
another in it uses the computer programs such as emails and messages to attack the
system. Viruses are also known as Spam messages.
Malware
■ It is termed as a Malicious software which can be created through the variety of forms
such as hostile, intrusive or annoying software program codes and software.

CONTINUE…..
DOS and DDOS attacks
■ This is generally arrived in case in which the website server gets overloaded with traffic
and simply crashes at the time when new story breaks out.
■ During the denial-of -Services, a malicious traffic overloaded which occurs at the time
when attacker over flood the website with traffic.
■ So in this situation, a website is unable to serve its content to visitor. This attack is
performed by machine and internet connection when large number of users sends the
multiple requests at the same time. A DDOS (Distributed Denial of services) attack is
more forceful as it is launched from the several computers and involve the range of IP
addresses.
DOS and DDOS attacks
■ This is generally arrived in case in which the website server gets overloaded with traffic
and simply crashes at the time when new story breaks out.
■ During the denial-of -Services, a malicious traffic overloaded which occurs at the time
when attacker over flood the website with traffic.
■ So in this situation, a website is unable to serve its content to visitor. This attack is
performed by machine and internet connection when large number of users sends the
multiple requests at the same time. A DDOS (Distributed Denial of services) attack is
more forceful as it is launched from the several computers and involve the range of IP
addresses.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

P2 Examining the organizational security
procedure
■ The main purpose of the information security is to Provide the
administrative, technical and physical safeguard to the operations and
data generated within the retailing business.
■ This is mainly used to protect the sensitive information from
unauthorised access, disclosure, corruption or destruction.
■ Security procedure is the detailed step-by-step instructions On enforcing
the security control within the organization.
■ This may consists of multitude of hardware and software components
which supports the secured business process.
procedure
■ The main purpose of the information security is to Provide the
administrative, technical and physical safeguard to the operations and
data generated within the retailing business.
■ This is mainly used to protect the sensitive information from
unauthorised access, disclosure, corruption or destruction.
■ Security procedure is the detailed step-by-step instructions On enforcing
the security control within the organization.
■ This may consists of multitude of hardware and software components
which supports the secured business process.

CONTINUE…..
■ In addition to this, The main purpose of the security procedure is to ensure the
consistency in implementation of the security control or execution of the security
relevant business process.
■ According to the scenario, Retail organization in London wants to expand the business
online so there is a huge requirement for the company to follow the security procedure
which meet the restricts the unauthorised access in gaining the control over the private
information of the business.
■ In addition to this, The main purpose of the security procedure is to ensure the
consistency in implementation of the security control or execution of the security
relevant business process.
■ According to the scenario, Retail organization in London wants to expand the business
online so there is a huge requirement for the company to follow the security procedure
which meet the restricts the unauthorised access in gaining the control over the private
information of the business.

P3 Potential impact of IT security with respect to the
incorrect configuration of firewall policies and third party
VPN
■ A firewall is a system that provides the network security for filtering incoming and
outgoing network traffic based on a set of user-defined rules.
■ The main purpose of the firewall is to reduce or eliminate the occurrence of the
unwanted network communications while allowing all legitimate communications to
flow freely.
■ It is as good as its policies and the security of its VPN connections.
incorrect configuration of firewall policies and third party
VPN
■ A firewall is a system that provides the network security for filtering incoming and
outgoing network traffic based on a set of user-defined rules.
■ The main purpose of the firewall is to reduce or eliminate the occurrence of the
unwanted network communications while allowing all legitimate communications to
flow freely.
■ It is as good as its policies and the security of its VPN connections.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

P4 Implementation of DMZ, Static IP and NAT
in a network
■ DMZ (Demilitarized Zones) are the network equivalent of the neutral ground. They provide
an isolated network segment for public-facing services such as mail servers and web services.
■ The Private net work in secured from such servers as the public accessibility makes them more
vulnerable to compromise. A standard DMZ approach mainly involves the use of Firewall
using three network interfaces.
■ A DMZ is basically a sub-network which is placed behind the firewall but open to the public.
This allows the public to use the services but it cannot penetrate the LAN.
in a network
■ DMZ (Demilitarized Zones) are the network equivalent of the neutral ground. They provide
an isolated network segment for public-facing services such as mail servers and web services.
■ The Private net work in secured from such servers as the public accessibility makes them more
vulnerable to compromise. A standard DMZ approach mainly involves the use of Firewall
using three network interfaces.
■ A DMZ is basically a sub-network which is placed behind the firewall but open to the public.
This allows the public to use the services but it cannot penetrate the LAN.


CONTINUE…..
■ For example, The DMZ with one public IP address for WAN and DMZ. According to
this the retail business has one Public IP address which allows the administrator to
configure the configurable port which is used as a DMZ port.
■ This allows the inbound HTTP traffic to the web server.
■ For example, The DMZ with one public IP address for WAN and DMZ. According to
this the retail business has one Public IP address which allows the administrator to
configure the configurable port which is used as a DMZ port.
■ This allows the inbound HTTP traffic to the web server.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

CONTINUE…..
■ NAT (Network Address Translation) mainly consists of different forms such as SNAT (Static NAT),
DNAT (Dynamic NAT), PAT (Port address translation).
■ Implementation of the NET with the main perspective of improving the network security within the
retailing business.
■ SNAT is one of the most commonly implementation technique which allows the access to the privately
addressed network via internet.
■ For example, The router which connects Web server to the internet mainly performing the SNAT which is
basically translating from the public IP address into private IP address.
■ NAT (Network Address Translation) mainly consists of different forms such as SNAT (Static NAT),
DNAT (Dynamic NAT), PAT (Port address translation).
■ Implementation of the NET with the main perspective of improving the network security within the
retailing business.
■ SNAT is one of the most commonly implementation technique which allows the access to the privately
addressed network via internet.
■ For example, The router which connects Web server to the internet mainly performing the SNAT which is
basically translating from the public IP address into private IP address.


CONTINUE…..
■ Dynamic NAT provides the functionalities that are device- specific IP
addresses.
■ DNAT mainly configures the public address which is assigned to hosts
and helps in reaching to the destination on the internet.
■ This helps in restricting the number of addresses according to the number
of authorised access
■ Dynamic NAT provides the functionalities that are device- specific IP
addresses.
■ DNAT mainly configures the public address which is assigned to hosts
and helps in reaching to the destination on the internet.
■ This helps in restricting the number of addresses according to the number
of authorised access
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

REFERENCE
■ McCormac, A. and et.al., 2017. Individual differences and information security
awareness. Computers in Human Behavior. 69. pp.151-156.
■ Olson, D.L. and Wu, D.D., 2015. Enterprise risk management(Vol. 3). World Scientific
Publishing Company.
■ Peltier, T.R., 2016. Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. Auerbach Publications.
■ Subandi, K. and Aryani, A.S., 2019. Analysis and Implementation of Backup Line Network
Using Branch Office VPN and Speedy Internet Broadband. Journal of Applied Sciences and
Advanced Technology. 1(2),. pp.39-48.
■ Wallace, M. and Webber, L., 2017. The disaster recovery handbook: A step-by-step plan to
ensure business continuity and protect vital operations, facilities, and assets. Amacom.
■ McCormac, A. and et.al., 2017. Individual differences and information security
awareness. Computers in Human Behavior. 69. pp.151-156.
■ Olson, D.L. and Wu, D.D., 2015. Enterprise risk management(Vol. 3). World Scientific
Publishing Company.
■ Peltier, T.R., 2016. Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. Auerbach Publications.
■ Subandi, K. and Aryani, A.S., 2019. Analysis and Implementation of Backup Line Network
Using Branch Office VPN and Speedy Internet Broadband. Journal of Applied Sciences and
Advanced Technology. 1(2),. pp.39-48.
■ Wallace, M. and Webber, L., 2017. The disaster recovery handbook: A step-by-step plan to
ensure business continuity and protect vital operations, facilities, and assets. Amacom.

1 out of 18
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.