HND Computing Unit 5: IT Security Report on Risks and Implementation

Verified

Added on  2023/02/01

|18
|1181
|61
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
IT SECURITY
LO 1 & LO 2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TABLE OF CONTENTS
INTRODUCTION
LO1
P1 Evaluating the types of security risks to organization
P2 Examining the organizational security procedure
LO2
P3 Potential impact of IT security with respect to the incorrect configuration of firewall
policies and third party VPN
P4 Implementation of DMZ, Static IP and NAT in a network
CONCLUSION
Document Page
INTRODUCTION
IT security is a set of cyber-security strategies that prevents unauthorised access to
organizational assets which includes computer, network and data.
IT security mainly maintains the integrity and confidentiality of sensitive information,
blocking the access to sophisticated hackers.
Document Page
P1 Evaluating the types of security risks to
organization
Security risk to the system is generally performed by the unauthorised
users in order to gain access of the confidential data for the purpose of
attempting cyber-attack.
This is a illegal practice which is mostly performed by the cyber
criminals with the intention of stealing the private data from the retail
organization in London.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CONTINUE…..
Different types of security risks are as follows:
Computer Virus
Malware
Trojan Horse
DOS and DDOS attacks
Computer worm
Document Page
CONTINUE…..
Computer Virus
This is a small piece of software which is mainly designed to infect, corrupt, steal or
delete the data from the system. This can be easily spread from one computer system to
another in it uses the computer programs such as emails and messages to attack the
system. Viruses are also known as Spam messages.
Malware
It is termed as a Malicious software which can be created through the variety of forms
such as hostile, intrusive or annoying software program codes and software.
Document Page
CONTINUE…..
DOS and DDOS attacks
This is generally arrived in case in which the website server gets overloaded with traffic
and simply crashes at the time when new story breaks out.
During the denial-of -Services, a malicious traffic overloaded which occurs at the time
when attacker over flood the website with traffic.
So in this situation, a website is unable to serve its content to visitor. This attack is
performed by machine and internet connection when large number of users sends the
multiple requests at the same time. A DDOS (Distributed Denial of services) attack is
more forceful as it is launched from the several computers and involve the range of IP
addresses.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
P2 Examining the organizational security
procedure
The main purpose of the information security is to Provide the
administrative, technical and physical safeguard to the operations and
data generated within the retailing business.
This is mainly used to protect the sensitive information from
unauthorised access, disclosure, corruption or destruction.
Security procedure is the detailed step-by-step instructions On enforcing
the security control within the organization.
This may consists of multitude of hardware and software components
which supports the secured business process.
Document Page
CONTINUE…..
In addition to this, The main purpose of the security procedure is to ensure the
consistency in implementation of the security control or execution of the security
relevant business process.
According to the scenario, Retail organization in London wants to expand the business
online so there is a huge requirement for the company to follow the security procedure
which meet the restricts the unauthorised access in gaining the control over the private
information of the business.
Document Page
P3 Potential impact of IT security with respect to the
incorrect configuration of firewall policies and third party
VPN
A firewall is a system that provides the network security for filtering incoming and
outgoing network traffic based on a set of user-defined rules.
The main purpose of the firewall is to reduce or eliminate the occurrence of the
unwanted network communications while allowing all legitimate communications to
flow freely.
It is as good as its policies and the security of its VPN connections.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
P4 Implementation of DMZ, Static IP and NAT
in a network
DMZ (Demilitarized Zones) are the network equivalent of the neutral ground. They provide
an isolated network segment for public-facing services such as mail servers and web services.
The Private net work in secured from such servers as the public accessibility makes them more
vulnerable to compromise. A standard DMZ approach mainly involves the use of Firewall
using three network interfaces.
A DMZ is basically a sub-network which is placed behind the firewall but open to the public.
This allows the public to use the services but it cannot penetrate the LAN.
Document Page
Document Page
CONTINUE…..
For example, The DMZ with one public IP address for WAN and DMZ. According to
this the retail business has one Public IP address which allows the administrator to
configure the configurable port which is used as a DMZ port.
This allows the inbound HTTP traffic to the web server.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CONTINUE…..
NAT (Network Address Translation) mainly consists of different forms such as SNAT (Static NAT),
DNAT (Dynamic NAT), PAT (Port address translation).
Implementation of the NET with the main perspective of improving the network security within the
retailing business.
SNAT is one of the most commonly implementation technique which allows the access to the privately
addressed network via internet.
For example, The router which connects Web server to the internet mainly performing the SNAT which is
basically translating from the public IP address into private IP address.
Document Page
Document Page
CONTINUE…..
Dynamic NAT provides the functionalities that are device- specific IP
addresses.
DNAT mainly configures the public address which is assigned to hosts
and helps in reaching to the destination on the internet.
This helps in restricting the number of addresses according to the number
of authorised access
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
REFERENCE
McCormac, A. and et.al., 2017. Individual differences and information security
awareness. Computers in Human Behavior. 69. pp.151-156.
Olson, D.L. and Wu, D.D., 2015. Enterprise risk management(Vol. 3). World Scientific
Publishing Company.
Peltier, T.R., 2016. Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. Auerbach Publications.
Subandi, K. and Aryani, A.S., 2019. Analysis and Implementation of Backup Line Network
Using Branch Office VPN and Speedy Internet Broadband. Journal of Applied Sciences and
Advanced Technology. 1(2),. pp.39-48.
Wallace, M. and Webber, L., 2017. The disaster recovery handbook: A step-by-step plan to
ensure business continuity and protect vital operations, facilities, and assets. Amacom.
Document Page
chevron_up_icon
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]