[SOLVED] Discussion 4 —- provide replies to Discussion 7

I don’t understand this Computer Science question and need help to study.

Struggling to find relevant content or pressed for time? – Don’t worry, we have a team of professionals to help you on
[SOLVED] Discussion 4 —- provide replies to Discussion 7
Get a 15% Discount on this Paper
Order Now

provide replies to below students posts:

Discussion 7:In terms of network security, what should organizational management allow and what should they block?


Network security management allows the administrator to manage a network consisting of physical and virtual firewalls in a central location. Administrators need network security management solutions to gain high visibility into network behaviors, automate device configuration, enforce global policies, view firewall traffic, create a unique interface for managing and reporting, and manage them.

Organizations now face threats against their information assets. At the same time, they are increasingly dependent on these assets. The rapid increase in the size and complexity of organizational networks will soon be the way forward for manual management. Most information systems are not inherently secure and technical solutions are only part of the holistic approach to information security. In recent years, a number of tools have been developed to automate this process. Establishing information security requirements is essential. However, organizations need to understand their unique threat environment. There are tools that allow to scan networks with multiple vulnerabilities and scan for attacks. In that network security after network security management. (Utz, L. (2018))

In network security organizational management allow :

1. First of all they have to setup a local firewall to prevent some trojans and backdoors.

2. They must install a descent antivirus to prevent from sort of viruses.

3. They must apply authentication and authorization for their services on the basis of layers, that who can access certain stuff, in which some authentication method will be there, like password protection to each user, so particular user if has rights to access then only he or she can.

4. They also has to block some sites which provoke viruses, on the basis of their content.

Saving only the work related data in the network.Complex passwords has to be encouraged. Use network and virus protection tools Provide two step authentication Block. saving employees personal information. Simple passwords has to be blocked intimate the employee the consequences of it. Don’t allow to disclose the company’s sensitive information. (Liu, J. (2018, August)


Organizational management plays a very integral role in the promotion of better delivery and achievement of optimal network security levels. The rationale for the above ideology can be explained from the fact that in as much as best policies guarantee better performance, users of computers and network systems must be closely monitored to ensure that their approach in work does not jeopardize the efforts of the organization in improving network security (Stewart, 2014). In light of the above, there are a number of things that organizational management may allow or block to ensure that network security levels are efficiently optimized.

For instance, management could allow access to the server room. This is because it is important to have an expert, or a team or expert with ready access to the server room in case of the occurrence of any emergency concerning the security of information. However, leaving the server room open should be blocked. That is, it is fundamental that the server room stays locked up and is only accessible by the authorized personnel – all other employees in the organization, without clearance to enter the server room, should be blocked. Notably, the server room stands out as the literal heart of the network security in a given organization and unauthorized access to switches, cables, routers, and the servers, among others, may result to destructive tampering (Kartch, 2017).

The management may allow the employees to bring their own devices to work. More so, they might be allowed the freedom to access any online resoruces using the corporate internet network. However, the above two workplace conveniences are countered with the disallowance of a few related practices. For instance, the management should block the use of home network for work purposes. The reason for the above is because the firewall robustness for the home network cannot be matched with that of the workplace, it is easier for hackers to take that advantage and use it as a loophole to enter into the corporate network system. Additionally, management should ensure that unused computers in the workstation are always disconnected or removed from the systems since they pose as easy entry points for intruders.

Discussion 4:Provide an example based on your professional experience of what motivate hackers to attack computer networks?

16 mins ago

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with MyCoursebay
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Customer 452653, October 31st, 2021
Thank You
Customer 452643, October 24th, 2021
Customer 452813, June 25th, 2022
Thank you for the outstanding work .
Customer 452635, June 5th, 2022
Customer 452813, July 9th, 2022
Social Work and Human Services
Thank You, Don!!! :)
Customer 452587, November 9th, 2021
Strategic Management
Thanks for the help, really appreciate it
Customer 452821, September 8th, 2022
Great work! Thank so much!
Customer 452707, March 1st, 2022
Customer 452813, June 30th, 2022
Always perfect!!! Don is the best!
Customer 452453, July 27th, 2021
Database design and optimization
thanks for busting this out so expeditiously. I hope that I get a good grade.
Customer 452715, February 19th, 2022
Criminal Justice
Impressive! Will be using the service again.
Customer 452485, December 5th, 2021
Customer reviews in total
Current satisfaction rate
3 pages
Average paper length
Customers referred by a friend
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Order your essay today and save 15% with the discount code DC15


Thank you for choosing MyCoursebay. Your presence is a motivation to us. All papers are written from scratch. Plagiarism is not tolerated. Order now for a 15% discount

Order Now