Monday, August 12, 2019
Network security Essay Example | Topics and Well Written Essays - 1250 words
Network security - Essay Example This firm is emerging as a huge business set-up with a head office located in New York. In the past few years, TAS has got massive popularity and now it has 10 stores in the area. The staff of TAS comprises more than 500 people. In order to connect its different stores the business has implemented a wide area network (WAN). However, the internal activities are performed by using local area network (LAN), which is established by using cables and other hardware devices. The implementation of this network has brought a number of advantages and improvements to business, however; in order to run its business operations effectively the firm has implemented an effective security mechanism. The firm has mixed a wide variety of security techniques to improve its network security. In this scenario, the business uses different security techniques to ensure the maximum security of its network. This paper discusses some of the important aspects associated with its network security. ... In addition, the absence of a network security can create many security challenges for a firm for instance a competitor or a hacker can gain access to private or vital information, which can destroy the entire business or personal information related to a specific system or data loss. In this scenario, an organization can implement effective network security when its employees and staff members have knowledge of network security. In simple words, in an attempt to ensure effective network security system users must follow organizationââ¬â¢s security guidelines (Kaminsky, 2012; Ray, 2004; Laudon & Laudon, 1999). Athleteââ¬â¢s Shack (TAS) makes use of a wide variety of security techniques to ensure the security of its network and business data. Some of the important techniques are outlined below: Username and Password Based Access: Each employee is provided with a username and a password which they use in order to access and use the system. For this purpose, they have an IT Centre , which is responsible for determining the access type for the organizationââ¬â¢s employees. Firewalls A firewall can be implemented in both hardware and software format as they are designed to stop illegal access to or from a private network. In addition, firewalls stop illegal Internet users from accessing private networks connected to the Internet, in particular intranets (Indiana University, 2012; Rouse, 2007). Since the different stores of the Athleteââ¬â¢s Shack (TAS) are connected using the Internet so they have implemented firewalls to secure their computers and network. Antivirus Software An anti-virus program stops viruses from entering into the computer network. In this scenario, TAS is using the latest version of Avira Antivirus1 that is very
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.